Empowering Team Members:

A Collaborative Approach to Cybersecurity

Jim Adkins, Vice President of Information Security and Chele Sylvester, Manager of Security Governance in front of a cybersecurity background.

Are you prepared to defend your data against the hidden threats of the digital world? Cybersecurity is more critical than ever as sophisticated attacks evolve, targeting individuals and organizations alike. From AI-powered scams to social engineering tactics, today’s digital landscape demands vigilance. Dive in to discover how EchoStar’s cybersecurity teams stay one step ahead—and how you can protect yourself, too.

 

Every year during Cybersecurity Awareness Month, a time dedicated to raising awareness about the importance of protecting digital spaces. For our Information Security (InfoSec) team, this is not just a month but a core part of their mission year-round. Key leaders of the InfoSec team, Jim Adkins, Vice President of Information Security and Chele Sylvester, Manager of Security Governance, shared their insights into the teams they lead and the role they play in keeping EchoStar secure.

 

The InfoSec team is a multi-functional unit with specialized areas, each responsible for a unique aspect of cybersecurity. This team is in charge of implementing and maintaining “security controls,” which are the protective mechanisms that shield our systems from threats. These controls include firewalls, email security filters, multi-factor authentication, file integrity monitoring and partnerships with cybersecurity companies. The team also scans software code to identify and resolve vulnerabilities, partnering closely with development teams to enhance security at every stage.

 

The InfoSec team also ensures that the entire organization meets necessary security standards and policies. Chele plays a central role in cybersecurity awareness activities, working to promote secure practices, and making sure all departments understand and follow security protocols. Jim leads the InfoSec team through a cycle of continuous improvement, regularly assessing and refining our security policies, architecture and operations to stay ahead of emerging threats.

 

InfoSec’s Governance, Risk and Compliance (GRC) team begins this cycle by establishing security requirements. These are evaluated and passed on to the Security Engineering team, which determines the best way to implement and monitor them. Operations then steps in, keeping an eye on any unusual activity and responding to potential threats. If gaps are identified, they loop back with the GRC team to reassess requirements and strengthen security controls. This approach ensures an ongoing improvement cycle where every layer of security is constantly refined.

 

 

 

As cyber threats evolve, so must our defenses. One of the more significant trends InfoSec has observed is the use of AI in social engineering attacks. Traditionally, social engineering attacks (like phishing) have been detectable through subtle language errors. However, AI has evolved to bridge this gap, allowing attackers to craft messages that are harder to distinguish from legitimate communication. That is why our InfoSec team is leveraging AI to counter these enhanced threats, staying ahead by leveraging the same technological advancements for defense that bad actors are using to deploy their attacks.

 

Another emerging threat is theft within hiring practices. Some attackers pretend to be potential hires, often in technical roles, to infiltrate company systems. These “applicants” attempt to gain access to sensitive data and onboarding process details, which can later be used in targeted attacks. InfoSec has therefore implemented stricter hiring procedures and identity verification methods, especially for remote candidates. For example, live video interviews are conducted and then reviewed for any unusual behavior or interaction that might signal a potential security risk.

 

It's important that all team members are well versed in cybersecurity best practices. That's why EchoStar conducts regular, required training. These trainings are packed with activities aimed at educating employees and boosting cybersecurity knowledge across the organization. One part of this initiative is the annual security awareness training—a requirement for all employees that includes modules on identifying phishing attempts, understanding social engineering tactics and practicing secure online habits. These courses are crucial for ensuring that everyone knows how to identify and respond to potential security threats. As Jim puts it, “we are dedicated to empowering our team members with the knowledge necessary to protect themselves.”

 

 

“Our biggest attack surface is our team member population, so we are dedicated to empowering them with the knowledge necessary to protect themselves and our organization.”

 

— Jim Adkins, VP of Information Security at EchoStar

 

In addition to standard training, InfoSec conducts phishing simulations to test team member responses to deceptive emails. These tests help the team pinpoint areas for improvement and provide feedback to our EchoStar colleagues. For those who pass the test, it’s a confidence boost, while those who click on suspicious links receive extra training to reinforce security best practices.

 

The InfoSec team doesn’t stop at annual training; they hold frequent workshops, often partnering with external experts and security vendors to explore new tools and technologies. For example, they recently hosted sessions with experts from Amazon Web Services, as well as internal panels to discuss how AI can enhance security operations. These events bring fresh perspectives to the organization, giving team members insights into the latest developments in cybersecurity.

 

Cyberattack prevention is just as much about understanding human behavior, as it is about solving complex technical problems. Members of the InfoSec team are committed to understanding not only how breaches happen but also why they happen. This “human element” is central to effective cybersecurity, as InfoSec team members must consider what might motivate an attacker and how they might behave. For this reason, interpersonal skills are highly valued alongside technical expertise in InfoSec roles.

 

The InfoSec team culture is collaborative, with a strong emphasis on trust and support. According to Jim and Chele, many team members describe the strong sense of camaraderie that comes from working together to overcome challenges. “When you work on critical and challenging initiatives together, you form a bond because you rely on each other heavily,” Chele explained. This team-centered approach not only strengthens internal operations but also promotes a supportive work environment where members feel valued and empowered.

 

“When you work on critical and challenging initiatives together, you form a bond because you rely on each other heavily. This environment helps our team members build trust, take pride in their work and learn new capabilities from one another.”

 

— Chele Sylvester, Manager of Security Governance

 

InfoSec leaders practice servant leadership, prioritizing their team members’ needs Jim embodies this by frequently asking, “What can I do for you?” Leaders in InfoSec see themselves as part of the team, working alongside their colleagues to achieve shared goals. This approach fosters an inclusive atmosphere where everyone feels empowered to contribute to the company’s security mission.

For those interested in joining InfoSec, a background in cybersecurity or a formal degree is not always necessary. Many team members bring diverse skill sets, and the team encourages candidates with a passion for cybersecurity to apply. Whether you’re coming from a technical field or another industry entirely, if you have a strong interest in cybersecurity, there are plenty of training programs and certifications to help you get up to speed.

The work done by InfoSec is crucial for protecting the company’s assets and reputation. The threats may be evolving, but with a dedicated team and a collaborative culture, our InfoSec team is well prepared to meet any challenge.

 

 

 

Read More Stories

Echostar Recognized as a Best Place to Work

Read Article

Unleashing Your Potential: The Adventure of Internal Mobility

Read Article

The Unseen Heroes: Credit, Fraud, Billing and Collections

Read Article