Episode 11

full
Published on:

30th Jan 2025

How to Avoid a Tech Layoff and Stand Out

🎙️ Episode Title: How to Stop Feeling Stuck at Work in Your Tech Job

📢 Are you working hard

but unsure if leadership actually sees your impact? You’re not alone. Most

tech professionals focus on uptime, code, and security—but executives care

about business outcomes. If you’re not speaking their language, you might

be missing out on career opportunities.

In this episode, I break down:

What the “company scoreboard” actually is (KPIs & financial metrics explained)

How to translate your work into measurable business value

The key financial and operational metrics executives track (that affect your job security!)

Why leadership doesn’t care about IP addresses—but does care about revenue and efficiency

Simple ways to make your contributions visible & career-boosting

💡 Tech professionals who understand business strategy get ahead—don’t get left behind.


🎯 FREE 5-Day Business

Skills Email Course – Learn how to align your tech work with business goals

→ https://titanof.tech/cio-ciso-free-email-course/


📩 Let’s Connect!

👉 Subscribe to the podcast for more insights on tech, business, and cybersecurity

leadership.

👉 Got a question or topic request? DM me on LinkedIn (@johnbarker78)

👉 Leave a review if you found this episode valuable!

#TechCareers #Cybersecurity #BusinessSuccess #KPIs

#SoftwareEngineering #TechLeadership

Transcript
Speaker:

Are you working hard, but unsure your efforts stack up

Speaker:

against the bigger picture?

Speaker:

Let's decode the scoreboard that runs your company and why it matters to your career.

Speaker:

Welcome to Titan of Tech, where we explore the intersection of

Speaker:

technology and business strategy.

Speaker:

Today, we're diving into an overlooked, but critical skill, understanding your

Speaker:

company's scoreboard, whether you're a cybersecurity professional, software

Speaker:

engineer, or tech manager, knowing how your company measures success.

Speaker:

Can transform how you contribute and grow a my name is John Barker.

Speaker:

I am a professor of cyber threat intelligence.

Speaker:

And also of the NSA approved cyber ethics policy and law

Speaker:

at the University of Arizona.

Speaker:

I also serve as a virtual chief information security officer as well

Speaker:

as a virtual chief information officer for many service based companies.

Speaker:

Picture this your team hits every technical milestone,

Speaker:

but at the end of the quarter.

Speaker:

Leadership seems underwhelmed.

Speaker:

Why?

Speaker:

It's not that your work doesn't matter, it's that the value of your efforts isn't

Speaker:

visible through the lens of the company's, hold on, some business jargon incoming,

Speaker:

Key Performance Indicators, or KPIs.

Speaker:

These metrics are the scoreboard.

Speaker:

They measure everything from revenue growth and customer satisfaction to

Speaker:

operational efficiency and innovation and understanding them isn't just

Speaker:

an executive's responsibility.

Speaker:

It's how you turn your work into visible, measurable impact.

Speaker:

But here's the kicker.

Speaker:

Most professionals in tech never take the time to learn this.

Speaker:

They stick to what's comfortable lines of code, system uptime, vulnerability scans.

Speaker:

But by stepping back to understand the overall scoreboard, you can align

Speaker:

your work with the strategic goals and showcase your value in terms that

Speaker:

business executives would understand.

Speaker:

Think of these as the metrics that leadership reviews determine

Speaker:

whether the company is winning.

Speaker:

Or losing.

Speaker:

It's easy to assume that this doesn't apply to you.

Speaker:

After all, you're not in sales or on the executive team.

Speaker:

But here's the truth.

Speaker:

The more you align your daily work with these metrics, the more visible and

Speaker:

valuable your contributions become.

Speaker:

For example, if your automation project reduces downtime framing, framing it

Speaker:

as saving X amount of hours, which improves operational efficiency,

Speaker:

that's how you connect your tech work to the company's scoreboard.

Speaker:

So, let's say you had a, uh, uh, an efficiency project and

Speaker:

you saved your company 10 hours of work per employee per week.

Speaker:

Your company has 10 employees.

Speaker:

The average cost of those employees, let's say it comes out to a hundred

Speaker:

dollars per hour for the company.

Speaker:

How much did you just save your company per week?

Speaker:

So you take 10 hours times 10 employees times 100 per hour.

Speaker:

You just saved your company 10, 000 per week.

Speaker:

So what's the more impactful way to demonstrate the value that

Speaker:

you brought to your company?

Speaker:

Hey, we deployed this code.

Speaker:

We deployed this new system.

Speaker:

Yay, great.

Speaker:

Or if you said, Hey, we saved the company 10, 000 per week by doing XYZ.

Speaker:

It's going to make it more powerful for those non technical managers.

Speaker:

So let's break down some of the most important financial

Speaker:

metrics that executives track.

Speaker:

These numbers influence investment decisions, hiring, and even

Speaker:

layoffs, as we're seeing now.

Speaker:

If you want to stay ahead, pay attention to these metrics.

Speaker:

Obviously, you've got overall revenue.

Speaker:

The total income before expenses, you've got profit margin, how much of that

Speaker:

revenue turns into actual company profit.

Speaker:

You also have EBITDA, Earnings Before Interest, Taxes,

Speaker:

Depreciation, and Amateurization.

Speaker:

And you also have burn rate, which is pretty much how fast is the company

Speaker:

spending his cash reserves, or if you're working on a specific project,

Speaker:

how fast are you spending the money that was budgeted for that project?

Speaker:

So some financial numbers aren't the only key indicators, the operational metrics,

Speaker:

such as customer acquisition cost turn rate can signal whether a company is

Speaker:

growing substantially or struggling.

Speaker:

So you've got other things such as.

Speaker:

What's the, what, how much does it cost to acquire a new customer,

Speaker:

which you may hear is the term CAC, or customer acquisition cost.

Speaker:

You may hear what is the customer's lifetime value, so the total revenue

Speaker:

from a customer over a period of time, how long do they averagely stay as a

Speaker:

customer of your business, which then turns into what's the churn rate,

Speaker:

what's the percentage of customers.

Speaker:

Who leave after or over a given time period or other productivity metrics.

Speaker:

So measuring efficiency and output and just kind of the various departments

Speaker:

learn the scoreboard.

Speaker:

Start by asking to attend meetings for performance metrics are discussed.

Speaker:

Ask questions like how do we define success this quarter or what's

Speaker:

driving customer retention or just understanding leadership, how they

Speaker:

see things at that bigger picture,

Speaker:

so translate your impact.

Speaker:

Once you know the metrics, map your work to them.

Speaker:

For instance, a software update might enhance user experience,

Speaker:

contributing to customer satisfaction, reducing the churn rate.

Speaker:

They'll stay a customer longer.

Speaker:

A security enhancement might reduce risks.

Speaker:

Which protects revenue and brand trust.

Speaker:

Tech professionals often struggle to articulate the

Speaker:

business value of their work.

Speaker:

For example, reducing server response time isn't just a technical achievement.

Speaker:

It improves the customer's experience, leading to higher satisfaction scores.

Speaker:

Similarly, automating a repetitive task doesn't just save time.

Speaker:

It allows the company to reallocate resources toward more innovation.

Speaker:

So this is a communication gap between non technical leadership and you.

Speaker:

And they won't spend the time to learn what you do.

Speaker:

They don't care about IP addresses.

Speaker:

They don't care about Python code.

Speaker:

They don't care about firewall firmware.

Speaker:

But you need to spend the time to speak their language.

Speaker:

Less zeros and ones and more dollars and cents.

Speaker:

The key is to tell the story of your work in terms of outcomes

Speaker:

that matter to the business.

Speaker:

This not only boosts your visibility, but positions you as a strategic thinker.

Speaker:

Understanding the scoreboard isn't a one and done task.

Speaker:

Treat it like a muscle you build over time.

Speaker:

Read quarterly reports from The industry news and stay curious

Speaker:

about how your company adapts its goals during the course of a year.

Speaker:

The more fluent you become in the language of business metrics, the more naturally

Speaker:

you'll tie your work to measurable impact.

Speaker:

Here's the bottom line.

Speaker:

The company scoreboard isn't just a tool for executives.

Speaker:

It's your compass for aligning your work with what truly matters.

Speaker:

By understanding KPIs, mapping your efforts to them through a financial

Speaker:

lens, and telling the story of your impact, you're not just another cog

Speaker:

in the machine, you're a key player driving success for the company.

Speaker:

And if you're ready to dive deeper into aligning your tech skills

Speaker:

with business success, check out my free five day business skills

Speaker:

email course in the link below.

Speaker:

And hey, while you're here, feel free to slap the like button if you like.

Show artwork for Titan of. Tech

About the Podcast

Titan of. Tech
Tech Trends, Triumphs, and Trials: The Human Side of Tech
"Titan of Tech" is more than just a podcast; it's a journey through the evolving landscape of technology. Each episode is a window into the future, offering insights and perspectives that you won't find anywhere else. This is the place where curiosity meets innovation, and listeners become well-versed in the language of tomorrow’s technology.

Why Tune Into "Titan of Tech"?

Diverse Perspectives: We bring you voices from all corners of the tech world – from seasoned CEOs of leading tech companies to the unsung heroes and rising stars in the industry. Get a 360-degree view of the technological panorama.

Beyond the Buzzwords: We delve deeper than the trendy tech jargon. Understand what Cybersecurity, Quantum Computing, or Artificial Intelligence really mean for the world and for you.

Global Tech Scene: Technology knows no borders. We explore international tech developments, giving you a global perspective on innovation and its impact.
Accessible Content: Whether you're a tech guru or a novice, our content is tailored to be accessible and engaging. We break down complex concepts into understandable and relatable discussions.

Future Focused: From predictions about the next big tech breakthrough to exploring how technology will shape our society in the future, "Titan of Tech" keeps you ahead of the curve.

In "Titan of Tech," every episode is a blend of passion, knowledge, and a vision for the future. We're not just reporting on technology; we're part of the conversation that shapes it. Our engaging narratives and in-depth analyses make us the perfect companion for your daily commute, workout, or leisure time.

Discover the stories behind the innovations that are transforming our world. Join our community of curious minds and tech enthusiasts. Subscribe to "Titan of Tech" and be a part of the conversation that's shaping our digital destiny. Connect with us online at https://podcast.titanof.tech and follow the future, today!

Follow at:
https://linkedin.com/in/johnbarker78
https://x.com/johnbarker78
https://instagram.com/johnbarker78
https://titanof.tech (Virtual CIO Advisory Services)

About your host

Profile picture for John Barker

John Barker

John Barker, MBA, CISSP, PMP, has worked as a Virtual CIO for the past 7 years. He has supported many executives in a wide range of industries. John's mission is to improve operational technology, identify technology value drivers, and improve cybersecurity defenses. John has led numerous cybersecurity evaluations. Using standard frameworks such as HIPAA and NIST cyber standards. John has been a regular featured columnist in Northern Virginia news outlets. He has over 35 technology columns published in the region.

John started his technology career working on Unisys mainframes in a manufacturing setting. This evolved into the lead network engineer for American Military University. The first online-exclusive accredited university in the United States. He has led a global multi-million-dollar Department of Defense technology program. That supports over 500,000 users. John advises high-net-worth families (300M+) on all technology and cybersecurity matters.

John is active in his community. John served four years in Culpeper County Broadband Planning Commission. The purpose was to expand high-speed internet access in the rural community. He has served on the Board of Directors for chambers of commerce. Served as the chairperson of marketing, and membership committees. John has been a regular at mock interviews and career days for local elementary and high schools. John has led technology entrepreneurial sessions for high school-age students. He instructs them on the steps to create a mock technology product and create a business plan. They "pitch" their ideas to other business leaders in the community.

In 2023, John served on the Technology Advisory Committee for Stafford County Public Schools. He assisted in writing the first A.I. policy voted on and approved by a School Board in the State of Virginia.

John currently works with two different cybersecurity organizations. John is a member of ISC2. He wrote new and reviewed questions for the current version of the Certified Information Systems Security Professional (CISSP) exam. This is the gold-standard information security certification. John is part of the Cyber Security Forum Initiative (CSFI.US) Cyber reporting team. The team aligns national security threat scenarios to common and uncommon cyber frameworks. The team also has access to information that cannot be disclosed.

Press List – Author
Mind-blowing AI Tools are here to stay
Date: March 4, 2023
Link: https://fredericksburg.com/opinion/comment-mind-blowing-ai-tools-are-here-to-stay/article_b603e478-b7c4-11ed-a7b0-838023b605f9.html
Category: artificial intelligence

Artificial Intelligence (AI) has seen an unprecedented leap into the public consciousness, especially with the advent of tools like ChatGPT, showcasing the potential for machines to mimic human conversation with remarkable fluency. AI's history, dating back to 1956, is built on the premise that human intelligence can be emulated by machines, leading to developments in reasoning, learning, and perception.
This technology has quietly underpinned everyday tools, from recommendation algorithms on YouTube to autonomous driving, without widespread public awareness of its mechanisms. The discussion around AI now also encompasses ethical considerations, such as the potential for plagiarism in AI-generated content and the embedding of biases within algorithms. Despite these challenges, the integration of AI into daily life and work is inevitable, urging a collective effort to harness its potential responsibly and ethically. The narrative is clear: AI is no longer a futuristic concept but a present reality, transforming how we interact with technology, understand creativity, and approach the ethical dimensions of digital innovation.

Cybersecurity is a people problem
Date: Oct 15, 2023
Link: https://fredericksburg.com/opinion/column/comment-cybersecurity-is-a-people-problem/article_042531f0-6924-11ee-8b91-fffa2f546f8c.html
Category: Cybersecurity
Cybersecurity incidents often stem from human error rather than technological flaws. For example, a major breach at MGM Resorts was enabled by social engineering, exploiting inadequate employee verification processes. Similarly, the Equifax breach resulted from unpatched servers, highlighting a lack of attention to basic security practices. Other incidents, like a casino hack via an internet-connected thermometer, illustrate the risks of integrating insecure IoT devices into critical networks. These examples underscore the importance of robust security protocols, regular updates, and education to mitigate human-related vulnerabilities. Awareness and proactive measures can significantly reduce the risk of cyber attacks.

Think Twice before using TikTok
Date: May 28, 2023
Link: https://fredericksburg.com/opinion/comment-think-twice-before-using-tiktok/article_55e76904-f3fe-11ed-b8a0-4fc03a885c17.html
Category: Cybersecurity
TikTok faces increasing scrutiny for its data privacy practices, with concerns over potential data sharing with the Chinese government due to its parent company ByteDance's ties. The platform's massive user engagement has drawn legislative attention, resulting in app bans and hearings aimed at mitigating security risks. Users are encouraged to critically evaluate their TikTok usage, considering the privacy and psychological implications of their engagement with the app.

‘Brute Force’ cellphone attack secures conviction
Date: April 22, 2023
Link: https://fredericksburg.com/opinion/columns/comment-brute-force-cellphone-attack-secures-conviction/article_0d2b4d80-ddff-11ed-8cd7-3b730ec21d54.html
Category: cybersecurity, law enforcement
At the heart of Alex Murdaugh's trial for family murder charges was a crucial cell phone video that challenged his innocence. The U.S. Secret Service's expertise in unlocking the phone revealed evidence critical to the case, showcasing the power and potential privacy concerns of digital forensic technology. This situation underscores the importance of robust personal cybersecurity measures, such as multi-factor authentication and secure passwords, to protect against unauthorized access to sensitive information.

Technology education evolving in Fredericksburg Region
Date: July 1, 2023
Link: https://fredericksburg.com/opinion/column/comment-technology-education-evolving-in-fredericksburg-region/article_248daac4-16b0-11ee-b3af-1ffb021e4fb5.html
Category: technology education

The document discusses the evolution of technology education in the region, highlighting the shift from traditional vocational programs to modern Career and Technical Education (CTE) offerings. It showcases local initiatives to engage youth in technology through summer camps and hands-on learning experiences. Programs range from building drones and gaming PCs to video game development and entrepreneurship in technology. These efforts are aimed at equipping students with industry-level certifications, real-world experience, and fostering a passion for technology from a young age, challenging them to think critically and innovatively.

Cybersecurity and the Internet of Things
Date: November 30, 2020
Link: https://www.youtube.com/watch?v=9UgaxG574TI&t=227s
Category: cybersecurity, IoT
John Barker leads a panel through a discussion of the cybersecurity risks in everyday household items that now connect to the internet.
Creating a Culture of Security
Date: Jan 23, 2020
Link: https://www.insidenova.com/culpeper/data-dump-creating-a-culture-of-security/article_6fd2bbb8-3de8-11ea-991b-9f8d164e71d4.html
Category: cybersecurity

Creating a culture of security is essential in combating the increasing threat of cyberattacks, which affect organizations of all sizes. Implementing foundational cybersecurity measures like firewalls, strong passwords, and patch management is crucial. Leadership must prioritize and practice these measures to influence the organization's culture positively. Regular training adapts to evolving cyber threats, emphasizing social engineering awareness. A non-punitive environment encourages reporting mistakes, fostering trust and improvement. External audits validate cybersecurity practices, ensuring adherence to standards. Despite existing regulations in some sectors, many companies lack comprehensive cybersecurity measures. Upcoming regulations, like the Cybersecurity Maturity Model Certification, will enforce stricter compliance and auditing, potentially extending to wider markets influenced by cybersecurity insurance trends.

Ignorance is not an excuse anymore!
Date: November 21, 2019
Link: https://www.insidenova.com/culpeper/data-dump-ignorance-is-not-an-excuse-anymore/article_a5309ae6-0c92-11ea-a3cf-e716081495ce.html
Category: cybersecurity


In recent travels and networking, a concerning trend of improperly secured websites has been observed, highlighting a persistent issue with security certificates. Many businesses, from startups to established companies, neglect basic web security, often resulting in vulnerable websites. The misconception that security breaches are unlikely and the lack of knowledge about the importance of SSL certificates contribute to this problem. It's emphasized that securing a website is a fundamental task that should not be overlooked, as it verifies the site's authenticity and secures data transmission. The article suggests actively ensuring web designers or hosting providers implement SSL certificates and explores options for securing websites, including free services. Ignorance of web security is no longer acceptable, underscoring the necessity for all, including those without technical backgrounds, to prioritize online security.

Is Your Cloud Data Safe from Prying Eyes?
Date: July 5, 2018
Link: https://www.insidenova.com/culpeper/archive/data-dump-is-your-cloud-data-safe-from-prying-eyes/article_c728ffc4-f902-5674-89be-9b178ad12ee1.html
Category: cloudy, security, privacy
The narrative explores the evolution and concerns surrounding cloud data security, focusing on encryption practices and the tension between user privacy and government access requests. It emphasizes the importance of encryption for data in transit and at rest, highlighting user control over encryption keys as critical for privacy. Major tech companies' struggle with government demands for data access is discussed, underscoring the ongoing battle for data privacy. The piece suggests that while cloud storage offers enhanced security and convenience compared to local storage, users should be aware of the potential for their data to be accessed by service providers or under legal compulsion.
Project Management Institute (PMI) Network Without Cringing (Really!) (Featured Guest)
Date: August 7, 2017
Link: https://www.pmi.org/learning/careers/network-without-cringing-really
Category: business, networking