{"id":40219,"date":"2023-07-30T12:33:29","date_gmt":"2023-07-30T16:33:29","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=543714"},"modified":"2023-07-30T12:33:29","modified_gmt":"2023-07-30T16:33:29","slug":"top-women-in-cybersecurity-panel-offers-career-advice","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/top-women-in-cybersecurity-panel-offers-career-advice\/","title":{"rendered":"Top Women in Cybersecurity panel offers career advice"},"content":{"rendered":"<p>A professional singer, a mother, and an association administrator are the backgrounds of five of the honorees for this year&#8217;s IT World Canada <a href=\"https:\/\/www.itworldcanada.com\/canadas-top-women-in-cyber-security\">Top Women in Cybersecurity<\/a> event.<\/p>\n<p>That came out at a panel discussion on careers during Wednesday&#8217;s fourth annual celebration honoring women in the industry.<\/p>\n<p>Consider these five women and their varied journeys into cybersecurity:<\/p>\n<p>&#8212; Melanie Anderson, executive director for cryptographic security and systems development at the federal government&#8217;s <a href=\"https:\/\/www.cse-cst.gc.ca\/en\"  rel=\"noopener\">Communications Security Establishment<\/a> (CSE).<\/p>\n<p>On entering the University of New Brunswick, she had a choice of studying music or computer science. She chose the latter because the department was recruiting women and thought, &#8220;Maybe this tech thing could be super cool.&#8221; She joined CSE &#8212; the branch of the government that protects federal IT networks &#8212; served time as a liaison with the U.S. National Security Agency, took time off for a singing career and is now back at CSE as director of cryptographic security anticipating quantum computing.<\/p>\n<p>&#8220;You can be creative and do all the things you&#8217;re passionate about and bring your whole self to cybersecurity,&#8221; she said.<\/p>\n<p>&#8212; Tracey Nyholt, founder and CEO of Calgary-based identity and access management startup <a href=\"https:\/\/www.techjutsu.ca\/\"  rel=\"noopener\">TechJutsu.<\/a><\/p>\n<p>&#8220;I worked my way up by offering to do tech documentation for people above me and letting them pass it off as their own work until I learned their job and eventually moved into their position.&#8221;<\/p>\n<p>&#8212; Juliana Zaremba, strategic partnership and product director at <a href=\"https:\/\/www.difenda.com\/\"  rel=\"noopener\">Difenda<\/a>, an Oakville, Ont., managed security provider.<\/p>\n<p>While studying math at the University of Waterloo, she became interested in computer science. Her first job offers were as an associate statistician, which seemed &#8220;a bit boring.&#8221; So she decided to work for a tech firm, which led to a job at a cybersecurity services provider.<\/p>\n<p>&#8212; Elaine Hum, director of cybersecurity partnerships at <a href=\"https:\/\/www.scotiabank.com\/ca\/en\/personal.html\"  rel=\"noopener\">Scotiabank<\/a>.<\/p>\n<p>&#8220;Cybersecurity found me,&#8221; she said. As a manager at the Canadian Bankers Association, one day she was told she had to facilitate regular meetings of the CSOs of the country&#8217;s banks. That led to a career in cybersecurity.<\/p>\n<p>&#8212; Andrea Stapley, chief information security officer at <a href=\"https:\/\/www.oanda.com\/ca-en\/\"  rel=\"noopener\">Oanda Corp<\/a>., a Toronto-based foreign currency exchange.<\/p>\n<p>Looking for a way to pay for university, she took a job on the Bank of Montreal&#8217;s cryptographic services team. Since then she has worked for TD Bank, Sun Life, Rogers Communications and now Oanda, doing a wide range of cybersecurity jobs. Along the way she took years off to have a family and then returned to work.<\/p>\n<p>Several of the panelists mentioned that it helped being a woman in the 21st century, when labour laws and corporate policies make it easier to be a mother and have a career.<\/p>\n<p>Zaremba, who has two young children, has been able to work from home. &#8220;I could be who I needed to be when I needed to be throughout the day,&#8221; she said, crediting her partner, her employer, and customers.<\/p>\n<p>All of the panel also said that having a mentor &#8212; a woman or a man &#8212; has been important in their careers.<\/p>\n<p>Anderson credits the dean of computer science at the University of New Brunswick, at the time a woman, with encouraging her. Another mentor was a manager at the NSA, and a third a leader at CSE who would bring Anderson with her to co-present at big government forums. Without &#8220;her honest and direct feedback I would not be where I am today,&#8221; she said.<\/p>\n<p>Hum said that at a previous job, a woman who believed in her helped get her first managerial position. She now tries to do the same for others. Recently she hired a woman with a mental illness who ended up performing well in part because she&#8217;d been given a chance.<\/p>\n<p>Stapley said one mentor early in her career just said, &#8220;You can do this&#8221; when she was &#8220;scared to death. &#8230; It pushed me out of my comfort zone and paved the way to building my confidence.&#8221;<\/p>\n<p>And sometimes it takes bravado. When Nyholt and a friend were founding TechJutsu, she didn&#8217;t have anyone to staff a project being pitched to a potential customer. The friend pretended she was that employee. They made a presentation, won the account, and created the startup. That friend is now a full-time staffer &#8212; and Nyholt&#8217;s mentor.<\/p>\n<p>The panel also offered sage advice to women who want a career in cybersecurity.<\/p>\n<p>&#8220;Be resilient,&#8221; said Hum. &#8220;Challenges and setbacks are inevitable in any career. Developing resilience to really bounce back from failures and obstacles is something that&#8217;s important.&#8221;<\/p>\n<p>&#8220;Keep pushing forward to your goals,&#8221; she added, &#8220;and make sure they are aligned with your values and aspirations.&#8221;<\/p>\n<p>The way to be resilient is to be brave, said Nyholt. Boys are socialized to get up if they fall in a playground. Girls, on the other hand, are socialized to be perfect. &#8220;We need to let go of being perfect, we need to take risks. If you fall down, get back up.&#8221;<\/p>\n<p>&#8220;Bring your authentic self to everything that you do,&#8221; said Anderson. &#8220;It resonates with people so they can be their authentic selves.&#8221;<\/p>\n<p>&#8220;People skills are really critical,&#8221; said Stapley, &#8220;because on our jobs we have to convince people to secure the organization &#8230; You have to hear people who are overworked and stressed and have other priorities, and as a security professional you have to help enable them and remove barriers and support them in order to get your job done.&#8221;<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/top-women-in-cybersecurity-panel-offer-career-advice\/543714\">Top Women in Cybersecurity panel offers career advice<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Developing resilience to really bounce back from failures and obstacles is something that&#8217;s important,&#8221; women were told. Read more about the pane<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[18,15,16,957,30],"tags":[391,393,275],"class_list":["post-40219","post","type-post","status-publish","format-standard","hentry","category-careers-education","category-leadership","category-security","category-top-women-in-cybersecurity","category-women-in-tech","tag-di","tag-security-strategies","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/40219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=40219"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/40219\/revisions"}],"predecessor-version":[{"id":40262,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/40219\/revisions\/40262"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=40219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=40219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=40219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}