In March 1998, I joined the cybersecurity industry fresh off a few roles selling Digital Equipment Corporation which became Compaq in 1998. Back then, "cyber" wasn't a buzzword. It wasn't even a boardroom topic. Most companies lumped information security (infosec) into the IT department, and even the idea of a full-time security professional felt excessive to many business leaders.

Fast forward to 2025, and the landscape couldn't be more different. Today, cybersecurity is central to every major business initiative — from AI adoption to digital transformation to geopolitical risk management. The journey we've taken from reactive firewall configurations to predictive, AI-powered defense systems is one of the most remarkable evolutions I've witnessed in any industry. As Dave DeWalt says, "We are living in the Golden Age of Cyber Innovation" and yet, the most exciting part may still be ahead of us.

Then: A reactive and isolated discipline

Looking back at 1998, it's clear that the cybersecurity discipline was in its infancy. We were primarily concerned with worms and viruses, which spread through various methods such as email attachments, and denial-of-service attacks that could take down a site with relative ease. A perimeter firewall, up-to-date antivirus software and a strong password policy were considered a mature security program.

Cybersecurity professionals were often relegated to the server room, seen more as technicians than strategic advisors. The tools were rudimentary, the threats were unsophisticated, and the broader business world didn't understand — or prioritize — the potential risk.

Even the language of cybersecurity hadn't matured yet. We spoke in terms of hardware, protocols and patches, not resilience, trust or business continuity. The idea that a cyber attack could bring down a company, compromise national security or undermine global markets was still abstract.

Now: Integrated, strategic and business-critical

Today, cybersecurity has grown into one of the most essential disciplines in the modern enterprise. The threats we face are more sophisticated and persistent, but we are also more equipped, better aligned and more empowered than ever before.

What excites me most about today's landscape is how security has become an integrated part of business strategy. It's no longer an afterthought or an add-on; it's a foundational element of innovation, customer trust and operational resilience.

Cyber leaders are now at the table, helping shape strategic decisions. We're advising CEOs and boards, aligning cyber risk with enterprise risk and driving transformation rather than reacting to it. The rise of the Business Information Security Officer (BISO) role is a great example of how this alignment has matured. Where once we struggled to translate risk into business impact, today we're fluent in both languages.

We're also embracing a more intelligent, automated approach to threat detection and response. AI and machine learning aren't replacing human intuition, but they are enhancing it, giving us the ability to process billions of signals in real time, detect subtle anomalies and respond with precision and speed.

Equally important is the cultural shift. Security is no longer a siloed IT function, it's a shared mindset across legal, compliance, HR, operations and product teams. The best organizations recognize that building a secure business is about building a secure culture. As we say at World Wide Technology,  when we work together — across all departments of an organization, in partnership with vendors and between peer organizations — we're secure, all together.

Lessons from the journey

The last 27 years have taught me some tough but invaluable lessons. One of the most important is that cyber resilience is not about perfection — it's about preparation. Breaches will happen. The organizations that endure are those that detect quickly, respond effectively and recover with transparency and accountability.

Another lesson: Innovation without security is fragile. In our rush to adopt new technologies — whether cloud, AI or connected devices — we've learned the hard way that overlooking security creates long-term risk. Embedding security from the start is now the only acceptable standard and I'm very thankful for CISA for developing "Secure By Design."

Perhaps most profoundly, we've learned that trust is earned. It can be lost in a moment and take years to rebuild. Security, privacy and integrity are now core to a company's brand, reputation and competitive advantage.

What could have changed the game back then

It's easy to look back and wonder how different things could have been if we had today's innovations in the late '90s. The truth is, many of the breaches and business disruptions of the past could have been mitigated or prevented entirely with the tools we now take for granted.

Multi-factor authentication (MFA), behavioral analytics, endpoint detection and response, zero trust frameworks — these are staples in our current toolkit that didn't exist or weren't widely adopted in those early days. Even basic visibility into user behavior and data flows would have radically transformed how we responded to threats like Code Red, Slammer or even early ransomware variants.

But hindsight is valuable. It helps us appreciate how far we've come and how far we still have to go.

The road to 2052

Looking ahead to the next 27 years out into 2052, I'm filled with both optimism and urgency. The next 27 years (although I hope to be retired) will bring even more profound shifts. We'll see the operationalization of cyber and physical systems, the rise of decentralized identity and the industrialization of quantum-resilient infrastructures.

AI will become not just a tool but a trusted partner handling detection, triage and even policy enforcement with precision. Human analysts will focus on the most complex, creative and ethical dimensions of security.

Digital trust will be a currency. Transparency in how we use data, govern AI and respond to incidents will determine which brands thrive and which fade.

And hopefully, we'll move toward global cooperation on cyber norms, a "digital Geneva Convention" that protects civilians, healthcare systems and critical infrastructure from nation-state aggression in cyberspace.

Why I'm so excited about WWT

At this pivotal moment in the cybersecurity journey, I couldn't be more excited about the role we're playing at World Wide Technology. What makes WWT special is the way we bring together strategy, execution and innovation in one unified model.

We're not just helping organizations react to threats, we're helping them rethink their architecture, modernize their approach and test their resilience in real-world conditions. WWT's Cyber Range is a perfect example: a live, collaborative environment where partners, customers and engineers can simulate, validate and accelerate their most critical initiatives.

What really energizes me is that WWT isn't afraid to lead. We don't just talk about secure transformation—we invest in it. Whether we're partnering on zero trust architecture, enabling AI with secure data pipelines, or helping critical infrastructure providers build cyber resilience, our work is making a measurable impact.

More importantly, we approach cybersecurity not just as a technology challenge, but as a human one. Our focus on people, processes and partnerships reflects the reality that cyber is a team sport. And it's one we're proud to play with some of the best minds in the industry.

Final thoughts

From 1998 to 2025, cybersecurity has transformed from an IT cost center to a cornerstone of business strategy. Along the way, we've learned that the best defense isn't just about tools. It's about mindset, leadership and culture.

At World Wide Technology, we're building that future every day, helping our partners navigate complexity, drive secure innovation and prepare for whatever comes next.

Cybersecurity isn't just a profession for me — it's a passion. As we look to 2052, one thing is clear: The digital world will only get more connected, more intelligent and more essential. Our job is to ensure it's also more secure.