Conversations With Cybersecurity’s Undervalued Workforce – Part 1
Peggy Smedley

Conversations With Cybersecurity’s Undervalued Workforce – Part 1

Peggy Smedley is the Editorial Director Connected World and Host of the Peggy Smedley Show

What advice would you provide to a women thinking about a career in cybersecurity & technology?

Always have an open mind, understanding that there is no magic to success, just passion, determination, and perseverance when everyone simply wants to call it quits. Never stop learning and stay connected with others. Have the confidence in yourself and wisdom to know that you can make a difference. Most importantly, enjoy the journey and just take it one chapter at a time.

Are there any particular challenges that you have personally faced in your cyber career??

For some companies, it’s hard to understand the need to balance time across family and work. But for me it was always important to have the right balance between faith, family, and business. This is why I launched my own firm; I wanted employees to recognize their career was just as important. But to be great employees, they needed to give back to their community and family to be truly good at what they do in their career.

What are current diversity employment and training initiatives missing??

It’s essential for the more tenured employee to share that wealth of knowledge with the newer employees. It’s truly invaluable. Most of us have a penchant to help the next generation become the best they can be and to share what we learned and how we’ve learned it. There is no better way to innovate then to continue to inspire subsequent generations. Unfortunately, we get so focused on doing our daily jobs that sometimes we forget that the biggest accomplishment we can offer future generations is sharing what we’ve learned; the education we can share with the next generation is so powerful. It’s our responsibility to encourage the next generation to be as excited for the future as we are and to innovate and be even smarter.

Are your role models found within or mostly outside of your industry??

My mother imparted one clear expectation: if I want it, I would be successful. It was this belief that has carried me through some of my greatest challenges. Since then I have had an amazing support system in my family and other men and women who have inspired me with their tenacity and desire to change the world around us. It’s these entrepreneurs who have taught me that through collaboration and communication almost anything is possible with disruptive technologies and a passion to change things.

Back to Introduction from Magda Lilia Chelly and Scott Schober

Continue onto Part 2 featuring Jane Frankland

Continue onto Part 3 featuring Deidre Diamond

Continue onto Part 4 featuring Rebecca Herold

Continue onto Part 5 featuring Julie Cullivan

More about Peggy Smedley:

Peggy has spent her career helping companies understand how innovative technology will help them navigate the flood of change so they can remain viable and competitive. She launched one of the most formative media companies more than 20 years ago. As a speaker, strategist, and futurist Peggy has been very fortunate to be part of ushering in the M2M/IoT (Internet of Things) and security era and taking a leading role in helping companies grasp how technology will alter their direction. She has enjoyed a career as an award-winning journalist with a long history of covering IoT, manufacturing, and construction technology. In 2008, and now 500-plus episodes later, The Peggy Smedley Show has become a must-listen-to broadcast for industry execs every Tuesday at 12 noon central.


Scott Schober

CEO | Author | Speaker | Cyber Security & Wireless Expertat Scott Schober LLC

Scott has presented extensively on cybersecurity and corporate espionage at conferences around the globe. He has recently overseen the development of several cell phone detection tools used to enforce a “no cell phone policy” in correctional, law enforcement, and secured government facilities. He is regularly interviewed for leading national publications and major network television stations including Fox, Bloomberg, Good Morning America, CNN, CCTV, CNBC, MSNBC and more. He is the author of "Hacked Again", his latest book as well as a contributor for Huffington Post and guest blogs regularly for Tripwire’s State of Security series. Scott also writes for Business Value Exchange, Fortune Magazine and IBM Big Data & Analytics Hub.


The title would have been more appropriate to 'part 3' where Deidre Diamond actually talks about the elephant in the room. The other articles don't talk about women being 'undervalued'

赞
回复
Simon J Smith

Cybercrime Expert Witness, Digital Forensic Investigator, Cybersecurity, IT/Software, CAM/CEM, Scams, Digital Fraud, Software 23+ yrs, CCISO CFE CCE CHFI MCSD/E PRINCE2/P CEH CAMS PSM CCSM COBIT5 ITIL CBP HTCIA IEEE FDRP

7 å¹´

and of course People and Process Management skills to trace and monitor the inputs and outputs. I too agree that passion is the driver. Australia is far behind in Cybersecurity and making really bad mistakes but this article talks about the pay differences in STEM which I've noticed relevant to the industry to add to the mix. Cheers. https://www.professionalsaustralia.org.au/professional-women/wp-content/uploads/sites/48/2014/03/Gender-pay-gap-in-Engineering-and-Science.pdf

Simon J Smith

Cybercrime Expert Witness, Digital Forensic Investigator, Cybersecurity, IT/Software, CAM/CEM, Scams, Digital Fraud, Software 23+ yrs, CCISO CFE CCE CHFI MCSD/E PRINCE2/P CEH CAMS PSM CCSM COBIT5 ITIL CBP HTCIA IEEE FDRP

7 å¹´

Hi Emile Loza de Siles. I was asked to be interviewed in an article about STEM which took a more factual approach when this question come up. I appreciate that many people unfortunately misunderstand the definition of Cybersecurity and Scott Schober is trying to write to all levels which can sometimes be hard. I read it in the mathematical way :) As you know on the job in real life is different to many who read. Some people perceive it to be pen-testing only. So many will hopefully read it as it should, being a discipline of forensic science consisting of experience of Cybercrime, Investigation, Mediation and Conciliation as well as Mitigation, Software Engineering, Counter Social Engineering, SDLC, all roles that are involved in the SDLC, C-Level Management Experience,

Scott Schober

CEO @ Berkeley Varitronics Systems | Cybersecurity Expert

7 å¹´

Thank you for your feedback. The title does not flow, but I think it addresses an important point. Women are important and extremely valuable in cybersecurity. Undervalued definition = fail to appreciate, minimized, underestimate the financial value of someone ..... which I feel oftentimes women do not get the credit they rightly deserve in the cybersecurity world & hence the title. The origin of the word dates back to the late 1500's and often was used in the context "to rate at too low a monetary value".

赞
回复
Emile Loza de Siles

Artificial Intelligence & Law Professor, Scholar & Advisor | Tech Lawyer | Leader | Scientist

7 å¹´

Not crazy about equating women with "undervalued," @Scott Schober.

要查看或添加评论,请登录

Scott Schober的更多文章

社区洞察

其他会员也浏览了