Celebrate ‘You’ - Be relentless, fearless, voice out!

Celebrate ‘You’ - Be relentless, fearless, voice out!

Let’s start with a beautiful quote by Ruth Bader Ginsburg -“Women will have achieved true equality when men share with them the responsibility of bringing up the next generation”. 2020 has taught that a family can have 2 heroes in the same home and share responsibilities while meting differences. Supporting and uplifting each other, leads to co-growth which can be a strong influence personally and the backbone for a positive career path. 

No alt text provided for this image

Usually women tend to be non-vocal about their achievements or problems. (This is merely my observation) I say, now is the time to be absolutely fearless, use various platforms both professionally and personally to share your thoughts, ideas and passion. Avoid assumptions, promote self and voice out when you see an opportunity for growth. Obviously this change cannot happen in a day. We do know that when a habit is followed with conviction, over time it becomes innate to us. Sometimes, revelling and following some incredible leaders can help stay on path.  

Some really incredible women in technology like Katie Moussouris are true inspirations. Her work with the U.S. Department of Defence was ground breaking, when she built the government’s first bug bounty program, “Hack the Pentagon.” She continues to influence the world of Cybersecurity enthusiasts to join and develop the Bug Bounty platforms for organisations. She has paved her own path in the field of cybersecurity, which has been considered to be a male dominated industry. Curiosity and thinking out-of-the-box are qualities that cybersecurity field constantly needs. It would be apt to say that women have it in their DNA and that’s the deal breaker. 

Identify inspiration around you, follow it, to create your own success path. If you want to make a difference to you and people around you, don’t just wait, make it happen. Think of a plan, chase it, reiterate when needed, but be relentless.

No alt text provided for this image

There are many platforms like InfosecGirls, OWASP Women In AppSec (WIA), Women’s Society of Cyberjutsu (WSC), Women in Cybersecurity (WiCyS), Women in Security Excelling (WISE) to name a few where you can meet like-minded women to join and network with other wonderful women leaders.


Remember, our career is a marathon; not a sprint. Identify a mentor/mentors who can guide you and help you walk the way to conquer your dreams. Some aspects like self assessments, goals and roles need to be vetted out as pre-work for it to be useful. Focus constantly on how security can be improved by learning and applying the necessary skills. Consider giving back to the community by way of teaching; writing blogs; join and contribute to free and open communities in India such as null community, OWASP chapters, etc. where you can participate. More than the mutual learning, it helps stay connected, motivated and recognised.

Click here to know about security solutions and services that help businesses prepare today for the cyber security threats of tomorrow.


Shivangi R.

Information Security| Security Operations | Threat Management | Vulnerability Management | Incident Response

4 年

Very Inspiring ??

Anushree Priyadarshini

Product Security And Compliance Lead at IBM | Ex-Senior Cyber Security Advisor at DELL | CISSP | CEH-Master | AZ-900 | CC |Toastmaster | Registered Scrum Master & Product Owner | Mentor at Sikshana | CyberSecPathshala

4 年

Very inspiring ??

pritha aash

Community Manager, CISO Platform

4 年

Very well expressed. Kudos

Priya Vasudevan

Senior Solutions Architect at IBM | e-Commerce | Technical Pre-sales

4 年

Beautifully penned and right-on-time for women’s day!

要查看或添加评论,请登录

Vandana Verma的更多文章

  • Try Hack Me - Application Security Resources

    Try Hack Me - Application Security Resources

    1. OWASP Top 10 Learn about the most common security risks in web applications.

    11 条评论
  • Resources to Start with Application Security

    Resources to Start with Application Security

    Many students have questions about Application Security Resources. Here are some resources to start with:- ??????????…

    5 条评论
  • Breaking Into Infosec

    Breaking Into Infosec

    Hi Everyone, At NULLCON, There were lot of students who asked me how to get into #cybersecurity or how to switch…

    17 条评论
  • Leaderspeak

    Leaderspeak

    Hi Everyone I am starting this new letter to share my learnings and discussions with the entrepreneurs and CISO's…

    34 条评论
  • Changing the Future For Women in CyberSecurity

    Changing the Future For Women in CyberSecurity

    I got the oppurtunity to speak at Purple Book Community Event and one of the amazing thing with the event was the theme…

    4 条评论
  • Security Leadership Series

    Security Leadership Series

    #leadership I wanted to know about how does an #entrepreneur or a #CISO day looks like, what are the challenges they…

  • Breaking Into InfoSec

    Breaking Into InfoSec

    Cyber Security or Information Security is the area where a lot of people want to get in now, which is an amazing thing…

  • 2021 LENS INTO CYBERSECURITY TRENDS

    2021 LENS INTO CYBERSECURITY TRENDS

    2020 was a year like never before. We all witnessed the twists and turns in our lives.

    4 条评论
  • How to Onboard a custom application using JWT

    How to Onboard a custom application using JWT

    JSON web token is (JWT), usually pronounced as ‘JAWT’ is open standard (RFC 7519). JWT allows us to send information in…

    1 条评论
  • Running an AppSec Program with Open Source (OWASP) Projects

    Running an AppSec Program with Open Source (OWASP) Projects

    We are all heading towards modernisation of applications. However, we still see the vulnerabilities like SQL Injection,…

    12 条评论

社区洞察

其他会员也浏览了