“WHERE ARE THE WOMEN IN CYBER?†The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X accounting for more than 55% of the workforce are on their way out. There is a new perspective shift happening industry-wide in tech because Gen-Z has arrived, and they don't ask for change - they command it. Millennials and Gen-Z currently make up only 35% of the workforce but that will grow to more than 75% by the end of 2030. The Solution We are not here to simply identify a diversity problem, we are here to solve it. Head-on. It is our mission to close this gap by inspiring and empowering Gen-Z women and minorities to seize their place in the cyber community. Breaking molds to choose careers inherently designated for us by gender bias. Branding cyber as lucrative and exciting. Nurturing a curiosity in tech where it was conditioned out of us. Dispelling the myths surrounding different niches and avenues into cyber and highlighting the success and fulfillment that can be achieved here. We are going to bestow strategies for navigating the mindsets we encounter on a daily basis and how to overcome the challenges they present. We're going to do this fueled by bold, raw, unfiltered insights to propel new talent forward and challenge managers to join the train of progress. WE ARE THE CYBER QUEENS AND WE'RE BUILDING THE SISTERHOOD OF CYBER.WHAT DO WE STAND FOR?1) RADICAL TRANSPARENCY We will never let ourselves, our message, or the value we give be censored or watered down to make a buck on this podcast or its audience. We will also provide truthful, value-driven insights according to our own experiences.2) SUPPORT & EMPOWER We advocate for women unequivocally supporting other women. Eliminating sexist mindsets, toxic competition and leadership between women and minorities. We get enough of that from everyone else. 3) SOCIAL INTEGRITY We are not here to lift women by bashing on men. We don’t believe success is pie and that more for us means less for someone else. We're here to educate and uplift anyone with an interest in getting into this field who may be at a disadvantage to do so.4) INSPIRING ACTION We offer practical advice that can be implemented immediately for listeners to further themselves and gain traction in their cyber education or career. We foster mutual collaboration and give our audience a platform to take action and be supported in those pursuits.5) CREATE LASTING IMPACT We curate content and speakers who deliver unbridled value to our listeners and their perspectives. We do not cater to guests and influencers whose message is limited to their own agenda or whose values do not directly align with our own and our mission.6) INVEST INTENTIONALLY We want to invest in ourselves by paying it forward as much as we can. We will buy from, monetize with, collaborate with, and promote working with other minority-owned small businesses FIRST wherever they can fill the need.Â
Maril Vernon, Erika Eakins, and Amber Devilbiss
In this episode, the queens are sitting down with the Women in Cybersecurity (WiCyS) organization with none other than the Executive Director herself- Lynn Dohm. Discover the pivotal programs and initiatives WiCyS offers to support and advance women in the cybersecurity sector. Lynn shares success stories, insights on overcoming industry challenges, and how listeners can engage with WiCyS to forge a more inclusive future in cybersecurity. Listen in to gain valuable perspectives and learn how you can contribute to diversifying the cybersecurity field.Get in Touch: Maril Vernon LinkedIn Stacey Champagne LinkedIn Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
In this episode, the queens are sitting down with the Women in Cybersecurity (WiCyS) organization with none other than the Executive Director herself- Lynn Dohm. Discover the pivotal programs and initiatives WiCyS offers to support and advance women in the cybersecurity sector. Lynn shares success stories, insights on overcoming industry challenges, and how listeners can engage with WiCyS to forge a more inclusive future in cybersecurity. Tune in to gain valuable perspectives and learn how you can contribute to diversifying the cybersecurity field.Get in Touch: Maril Vernon LinkedIn Stacey Champagne LinkedIn Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **Welcome to The Cyber Queens Podcast! The Cyber Queens are here to close the cyber gender ad diversity gap!In this episode, The Cyber Queens are joined by Catilin Sarian to discuss the importance of Cyber Security Awareness training, and how to make it more interesting and accessible for those outside the industry. The Queens and Caitlin discuss the importance of bringing easy to digest content to platforms like Tiktok to help reach larger audiences with bite sized and relatable videos to help make Cybersecurity more approachable. Caitlin also discusses the importance of diversity in cyber, the entry level hiring crisis, and how humans are the weakest link in Cybersecurity! Tune in for some discussion on the scary places you might find someone's “hidden” passwords and much more!!Key Topics:Cailtin Sarian's Story Purpose of “Cybersecurity Girl”CyberSecurity meets TikTokAdvocacy and Education in Cybersecurity The most pressing threats and role of education in preventing threats such as phishingImportance and benefits of diverse perspectives Cybersecurity Girl LLC - plans for influencing and empowering cybersecurity for allThe weakest link in Cybersecurity - What is the real problem?LinksWhat is Phishing? https://en.wikipedia.org/wiki/PhishingWhat is Social Engineering? https://en.wikipedia.org/wiki/Social_engineering_(security)What Is VPN? https://en.wikipedia.org/wiki/Virtual_private_network Connect w/ Caitlin!Caitlin Sarian LinkedIn – https://www.linkedin.com/in/caitlin-sarian/ Cybersecuritygirl Insta – @Cybersecurity_girl Cybersecuritygirl TikTok – @CybersecuritygirlGet in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In cybersecurity, a remarkable transformation is taking place as women increasingly break down barriers and rise to leadership positions. Historically, this field has been predominantly male-dominated, but today, women are making significant strides in shaping the future of cybersecurity. Their contributions are not only challenging stereotypes but also enhancing the industry's diversity and effectiveness. This transformation is not just about equality; it's about recognizing that diversity in leadership brings fresh perspectives, innovative solutions, and a stronger defense against cyber threats.In this episode, we are joined by Brandi Moore, the CRO of Mitiga, to talk about how women can rise to leadership positions in cybersecurity. Brandi shares her story from being the director of sales to the COO of COFENSE, what Brandi looks for in a product or a company that she wants to work with and help grow. She also advises people looking to build a career in cybersecurity and females in tech who dream of being in leadership positions. Tune in to learn more about this and other exciting topics!Timestamps[01:02] Brandi's journey in cyber and how she got where she is today[02:06] The number of companies that Brandi interviewed with that do not have female leadership[05:29] Diversity and quality in cybersecurity[07:32] How the system is broken for job hunters[22:33] What Brandi looks for in a product or a company that she wants to work with and help grow[26:44] Brandi's advice to females in tech who dream to be in leadership positions[31:43] Advice to people looking to build a career in cybersecurityNotable quotes:“Sometimes you have a great idea and spend a lot of time explaining it to people and then the world sort of works with you. The world connects you with the right people.”“We need leadership in all these organizations to make diversity a genuine initiative instead of just discussing it.”“Tech and everything in the world changes every two years. So, you have to figure out how to follow the tech and everything else that is changing.”“Don't give up on cybersecurity. Find people who have already succeeded for advice.”Connect with Brandi Moore:LinkedIn: https://www.linkedin.com/in/brandimoore/Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **Attending hacking conferences is essential for professionals in the field as it provides an opportunity to learn about the latest developments and technologies, network with peers, and stay up-to-date with current trends. However, attending these conferences can be costly, especially for individuals or small companies with limited budgets. In this context, hacking your way into these conferences, cheap or free, can be a valuable strategy for maximizing your resources. By finding ways to attend these events without breaking the bank, you can benefit from the valuable knowledge, skills, and connections that they offer, thereby enhancing your career prospects and improving your overall professional development.In this episode, we will explore the cheapest ways you can attend hacking conferences and how they can help individuals to take their skills to the next level and expand their professional network. We will also highlight some of the best hacking conferences around the world, and what attendees can expect from these events. We talk about the Black Hat and Def Con, why people share scary stories about hacker conferences, and the value you can get from conferences. Tune in to learn more about this and other exciting topics!Notable quotes:“If you are scared to do a big con, start with a small one in your area.”Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In the fast-paced and ever-evolving world of cybersecurity, building authentic relationships has become crucial for success in sales and marketing. In this age of impersonal communication and fleeting attention spans, establishing genuine connections with potential clients and customers can make all the difference in building trust and securing partnerships. So, how exactly does authentic relationship building translate to success in cybersecurity sales and marketing?In this episode, we are joined by Dani Woolf, the Founder and CEO of Audience 1st, to talk about the value of building genuine relationships in business and share some tips for building authentic relationships with customers in cybersecurity. We talk about the challenges that Dani had to overcome in opening the company in a male-dominated world, Dani's experience of sitting down with her customers (the highly technical people), and the biggest problem in sales and marketing in the cybersecurity industry. Tune in to learn more about this and other exciting topics!Notable quotes:“Stay resilient, know your course, and don't give a F of what people say. Just do what you really love.”“Your network is everything.”Episode resources:The book: Empathy In Action: How to Deliver Great Customer Experiences at ScaleConnect with Dani Woolf:Twitter: https://twitter.com/thedaniwoolfLinkedIn: https://www.linkedin.com/in/daniarad/?originalSubdomain=ilWebsite: https://www.audience1st.fm/Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **The world of cybersecurity has long been considered a male-dominated field, but that's slowly changing as more and more women are breaking through the glass ceiling. In this inspiring story, we'll take a closer look at the journey of a female entrepreneur who is not only making waves in the cybersecurity industry but is also empowering other women to pursue their dreams in this highly competitive field. From overcoming stereotypes to paving the way for future generations of women, this story is about resilience, determination, and unwavering commitment to success.In this episode, we are joined by Victoria Germanova, the Founder and CEO of Callity, a security buyer/vendor matching platform, to share her experiences of building a business in the male-dominated world of cybersecurity. Victoria talks about the idea behind Callity, her experience in sales, and how the sales process in cyber is broken. She also shares some insights on the challenges that female entrepreneurs in cybersecurity face, what made her start a company in the technical field as a non-technical person, and advises other women who want to be entrepreneurs. Tune in to learn more about this and other exciting topics!Notable quotes:“If you put in the work and have a strong belief that is held by weak assumptions, you can do anything.”“To work in tech, you don't have to be a technical person, but being a little technically inclined will help us respect where you are coming from and know your position.”“Anything you do, if you do it for a long time, you get better at it.”“Don't let fear hold you back. Start the business, and you will get better with time.”Connect with Victoria Germanova:Callity has since folded as an enterprise but you can still connect with Victoria who may be down but isn't out!LinkedIn: https://www.linkedin.com/in/victoria-germanova/Twitter: https://twitter.com/CallityHQGet in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, The Cyber Queens are joined by Christa Weik who is a Certified Information Privacy Professional (CIPP), GRC and Cybersecurity Policy and Program Manager. Christa's educational background is in cyber so she did attend a bootcamp before entering the field. She can build, scale, and maintain the GRC and Privacy considerations of any cybersecurity strategy for any sized enterprise and security organization. She also has knowledge of the following regulatory laws, audits, and frameworks: ISO, PCI-DSS, FISMA, HIPAA, GDPR, SOX, SOC2.Key Topics:Christa Weik's Story & How She Became The Cyber Queens First MenteeWhat is GRC?GRC & Privacy Specialist OverviewWhat Does A Career In GRC & Privacy Look Like?How Can Someone Get Into GRC & Privacy?Road To The Cyber Queens Mentorship What Do You Hope To Get Out Of This?What Does The Future Look Like?Sources:What is GRC? https://tinyurl.com/2p8vjktt What is a GRC Analyst? https://tinyurl.com/meh9xu5p What is a Data Privacy Analyst? https://tinyurl.com/ymajpu8x What is GDPR? https://tinyurl.com/yme88xekWhat is CISO? https://tinyurl.com/2pewzrmw What is Data Privacy? https://tinyurl.com/34rh4mvv Forcepoint: https://www.forcepoint.com/ Google: https://www.google.com/ Trello: https://trello.com/What is Jira? https://www.atlassian.com/software/jira ServiceNow: https://www.servicenow.com/ SentinelOne: https://www.sentinelone.com/ SentinelOne SKO: https://tinyurl.com/bd9cdn5f WICyS: https://www.wicys.org/ What is SEO? https://en.wikipedia.org/wiki/Security_engineering Audience 1st Podcast: https://www.audience1st.fm/podcast/episodesWTF Did I Just Read Podcast: https://wtfdidijustread.com/ CISO Distillery: https://tinyurl.com/5xm8bf9d Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **The Cyber Queens Podcast is back with an exciting episode focused on the business intelligence function featuring Maril's amazing sister Camille Vernon who is a Business Intelligence (BI) Engineer. What is Business Intelligence? Why is this relevant to cyber? How does someone with no experience decide they want to work in BI?Camille Vernon did not study anything related to tech in college! In fact, she has degrees in math & statistics! After college, she went down a non-tech career path. She didn't realize that she was destined to be in tech until someone in her LinkedIn network reached out to interview her for a role. Camille shares her journey into tech and all the fun/struggles that came with it. Camille has some great tips and tricks throughout the entire episode, so stay tuned the entire time! This episode was definitely hard to press the pause button because it's some real-life vibes!!!Key Topics:Camille Vernon's StoryBusiness Intelligence…What Is BI? What Is A BI Engineer?Required Skills To Get Into BI & How To Prepare For A Career In BIPrevious Education Should Not Stop You From Coming Into CyberCan Leaders Take A Chance On Someone Without Industry ExperienceUtilizing Your Current Skills – Tell Them To Take A Chance On YouWomen Being Loyal & How To Navigate Through ThatImportance Of Networking!How BI Ties Into An OrganizationBest Practices To Have A Successful BI TeamCamille's Professional & Personal Struggles While Entering Tech/CyberPro Tips From The FieldSources:What is Business Intelligence? https://tinyurl.com/29y46nku What Is SQL? https://tinyurl.com/288hmude What Are KPI's?: https://tinyurl.com/mpz7af9x Camille Vernon LinkedIn - https://www.linkedin.com/in/camille-vernon/ Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **The Cyber Queens Podcast is back with an exciting episode focused on breaking into the cybersecurity industry. Join the Cyber Queens as they chat with Mackenzie Wartenberger about her journey into the world of cyber and how she was able to make a successful career change. Mack shares her experience as the first recipient of the GRC Accelerator Train-To-Hire Program at Aquia Inc. This 6-month-long program provides paid apprenticeships, training materials, and dedicated mentorship to individuals who may not have the means to access further education or qualify for a cybersecurity job.The Cyber Queens and Mack break down the common misconception that one needs to be technical to enter the cybersecurity field. You will hear Mack share her inspiring story of how she broke into cyber, along with the reasons why she chose this field. The Cyber Queens also share their own experiences and backstories of how they ended up in this wonderful industry. Finally, they discuss Mack's next steps and offer insights on how you can replicate her success.Tune in to The Cyber Queens Podcast to learn more about breaking into the cybersecurity industry and how to close the gender/diversity gap that cyber is experiencing.Key Topics:Mack's Before & After Cyber JourneyWhy Mack Chose The Cyber Security FieldHow Mack Found A Cyber Opportunity & Breaking InAquia Inc GRC Accelerator Train-To-Hire ProgramMack's Pre-technical Interview Processes & SelectionSo You've Landed Your First Cyber Gig….How Did You Learn?Soft Skills & How They Apply To A Cyber CareerWhat's Next For Mack?01:52 – Mack's Before & After Cyber Journey05:05 – Why Mack Chose The Cyber Security Field07:14 – Careers Before Cyber10:25 – Breaking Into Cyber Cold…..The How To's From Mack 11:45 – GRC Accelerator Train-To-Hire Program at Aquia Inc.12:55 – Networking Is KEY14:32 – The Right Mindset Can Set You Up For Success14:40 – Knowing Your Strengths Can Help You Navigate 17:30 – In Cyber You Will Not Know Everything & That Is OK20:07 – Entering Cyber Doesn't Require Stepping Into A Super Technical Role, It Can Be GRC Or Compliance25:00 – Soft Skills Can Help You In A Cyber Career25:16 - Aquia Inc. GRC Accelerator Train-To-Hire Program36:50 – Final TakeawaysSources:Aquia Inc.: https://www.aquia.us/ Aquia Inc. GRC Accelerator Train-To-Hire Program: https://tinyurl.com/mr3yzxwv What Is A Security Analyst?: https://tinyurl.com/yeykz99s What Is A Compliance Analyst?: https://tinyurl.com/2rzuwjkz SOC Audit: https://tinyurl.com/2wuuxscc What Is GRC?: https://tinyurl.com/225j9yyz What Is Kubernetes?: https://www.ibm.com/topics/kubernetes What Is NMAP?: https://tinyurl.com/bdfhrjfe What Is CISA?: https://www.cisa.gov/about What Is The Red Team?: https://tinyurl.com/2xttz2wm CompTIA Security+ Certification https://www.comptia.org/certifications/security What Is Python?: https://tinyurl.com/4d65nprs Cybrary: https://tinyurl.com/4ames68c Mackenzie Wartenberger – LinkedIn https://www.linkedin.com/in/mackenzie-wartenberger/ Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, we discuss the obvious….BREACHES, BREACHES, EVERYWHERE!!! Maril & Erika discuss two recent breaches at large organizations: Uber & LastPass. Maril breaks down how they happened from an offensive perspective & as always Erika her common sense of how to avoid being a victim of a breach. We also offer guidance on how to be proactive vs. reactive to the day-to-day users. After listening to the live episode, we realized that the industry has a boatload of acronyms as usual! Don't worry we are keeping a tally of them for you and plan to release a Cyber Acronym Cheat Sheet for you! I hope you enjoy this episode as much as we did and remember to share with a friend/family member/lover/whatever. Key Topics:Breaches, Breaches, Everywhere!Current Breaches In Large CompaniesRamifications & Responses We Are SeeingHow Breaches Happen From An Offensive PerspectiveHow The Average User Can Be Proactive vs. Reactive From BreachesAdvice For Users & Companies If/When You Are BreachedPassword Policies & Multi-Factor Authentication (MFA)Executive Order 14028High-Profile Breaches of 2022Potential Ramifications For Users & Their Data As A Result Of The Hack For An Organization & The Basic User?What To Do If Your Account Is Hacked/Compromised As A Basic UserSmishing…..What Tha?????Sources:ChatGPT Article: “Google Fi suffers data breach following T-Mobile hack” Twitch LayoffsUber BreachLastPass BreachWho Is Lapsus$?Maril's LinkedIn Post Around Two Marines Defeating AI1Password BitwardenEO On Improving The Nation's Cybersecurity: https://tinyurl.com/3j82p4kn & https://tinyurl.com/4srnxy2u Aquia Inc's Webinar Discussing EO 14028 with Chris Hughes (Aquia CISO): https://tinyurl.com/3dx2rzbk Microsoft Digital Defense Report 2022 (MDDR 2022): https://tinyurl.com/5n872652 The Basic Security Controls From CIS: https://tinyurl.com/2j9fpeh4 MITRE MatrixCOMPTIA Sec+Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, we discuss the monster layoffs in tech and the hiring trends. We have seen numerous layoffs handled poorly and numerous handled properly. We walk through what we each have seen and our opinions on why the layoffs are happening. Your Cyber Queen Erika was part of a mass layoff in December 2022, so she shares her experience with all of you.As always, The Cyber Queens share strategies and how to be prepared. We cannot stress enough how important personal branding is for you! We also stress the importance of using LinkedIn for networking and that we still NEED you in cyber!Key Topics:Addressing the Tech Layoffs & HiringLayoff Demographics The Queens Are SeeingThe Industry Looks Scary To Target Employment BUT WE NEED YOUErika's Personal Tech Layoff ExperienceStrategies To Get Hired In Tech & To Keep Spirits HighImportance Of Your NetworkImportance of Personal BrandingQualify OrganizationsWhy Are These Layoffs Happening & How to Spot A Good OpportunitySources:TikTok by Amber DeVilbiss “What It's Like Being In Tech Sales” Crunchbase.com “Tech Layoffs: U.S. Companies That Have Cut Jobs In 2022 and 2023” Erika's New Employer SentinelOneNaomi BuckwalterMicrosoft LayoffsChatGPTNetWarsMenlo SecurityBug BountyVulnerability Disclosure Policy (VDP)WiCyS ISSACTACSAISACABlackHatCorporate BroGuidePoint SecurityGet in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, The Cyber Queens go in-depth discussing navigating toxic & negative mindsets minorities sometimes encounter in the cyber field. and the strategies to help overcome them. We share personal & professional experiences we have all dealt with and the inherent cultural differences of being a woman or minority in cyber vs being a man in cyber. We also provide recommendations on how to deal with these mindsets and certain tacts you can employ to effectively challenge, rise above, or change minds. Your Queens are looking to do more than point out a problem; we want to empower you to move past these mindsets in cyber and everyday life because they didn't stop us and shouldn't hold you back. Key Topics:The Queens Experiences Dealing With Toxic & Negative MindsetsBeing Females & Minorities In Tech/CyberRecommendations On How To Deal With Toxic & Negative MindsetsStrategies To Resolve With Toxic & Negative MindsetsSources:Pennsylvania Human Relations CommissionGet in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, The Queens dive into the difference of being hired into cyber as the “diversity hire” or being “hired for talent.” Today's featured guest is Amber DeVilbiss (@engineeramber) - Security Advisor at GuidePoint Security. Amber has spent the past 14 years in cybersecurity, she wrote and published a children's cyber security book “The Little Cyber Engineer,” and is the founder of a non-profit Teach Kids Tech. Amber and the Queens share their experiences of being a female in cyber- a heavily male dominated field. From this episode, you can get a good understanding of how to navigate being the diversity hire and talent hire. You will get some advice around how Gen-Z is changing the workforce. You will also hear some of our “war stories” from the field and how to identify when you are stuck in one. We hope you will enjoy this episode as much as we did because its AMBER DAY!!!!Key Topics: Hiring For Diversity vs. Hiring For TalentNavigating The Diversity HireNavigating The Talent Hire How Does Being The Only Female On Your Team Affect Your Actions Or Approach?War Stories From The Field Of Being A Woman In CyberThe Acronym Conundrum Success Based Off GenderWomen Only Advance In Cyber Through Sexual Encounters Not KnowledgeWomen Become Desensitized To The Gender Discrimination In Cyber & Accept It As “Normal”Advice For Gen-Z On How To Handle Being The Diversity HireDiversity Hiring Advice To Companies…..Butt In Seats Is Not EnoughHow Gen-Z/Diversity Is Changing The Workforce Sources:GuidePoint SecurityAmber's Book “The Little Cyber Engineer” Amber's Non-Profit Company “Teach Kids Tech” LIFT, Empowered By Women In Security DEF CON ConferenceCyber Queens Episode 9 – Gen-Z Strengths & Weaknesses Get in Touch with AmberAmber DeVilbiss - TikTok or Instagram @engineeramberAmber DeVilbiss – LinkedIn Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, The Cyber Queens discuss the difference of how men act in the work vs how women act in the workforce. Women are often forced into limited roles born from a need to over-prove themselves or they are “mom guilted” into picking up more than their fair share of team slack. For decades women have been held back in their careers by inherent biases but we focus on how this applies to the cyber field. The Queens also share give specific examples of how this has happened to them throughout their careers. It's important to note that women do not only do this to themselves or make it up in their heads. There are certain types of leadership who are more than willing to enable and exploit these mindsets and traditional roles. But the Queens share strategies on how to combat being held back and unbalanced workloads. If you've ever felt like you have been held back or constantly have to overprove yourself just know you are NOT alone!!!!Key Topics:How Women Act In The WorkforceTypes Of Leadership Who Take Advantage Of Women & Minorities Resulting In Holding Them BackWomen Tend to Have To Over Prove Themselves In CyberConsequences Faced When Women do Over Prove ThemselvesWomen Often Expected To Be A Pretty Face for the TeamMen Can Be Lax BUT Women Are Still Expected To Over Prove ThemselvesWhy Are Women's Strengths Used Against Them?Women Are Viewed As A Threat vs An AssetWomen Are Often “Left Out” Of Male Groups/DepartmentsBias Paradox – Women Shy Away From Things A Man Wouldn'tStrategies To Combat Being Held Back & Over Proving YourselfSources:Zoom Communications: https://zoom.us/ Blackhat Security Conference: https://www.blackhat.com/ Amber DeVilbiss' (@engineeramber) TikTok “What It's Like Being In Tech Sales”: https://www.tiktok.com/t/ZTRxYArV6/Horrible Bosses: https://tinyurl.com/msfmw9t9 Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In so many of our episodes we talk about what we love about Gen-Z and how they're going to change the work scene. But there are some lost arts and skills crucial on them to recognize and adopt in working with and relating to older generations as well. To do that- we didn't just comment on Gen-Z from afar we brought one of them in to give us a first-hand perspective! We had a great time recording this episode with fantastic Gen-Z guest, and SOC Analyst Molly Rhoads.In this episode, we debunk Gen-Z's entitlement, specifically around salary expectations. We go into details about what it is that Gen-Z truly values and what is important for the Gen-Z to keep in mind and also, what is important for employers to keep in mind. LEEEEZZZ GOOOOO!!!!!!!!!!!! Key Topics:- Debunking Gen-Z's Entitlement- Gen-Z and Diversity, Unlimited PTO, Mental Health- Gen-Z's Capability Regarding Soft Skills- Mentoring and Leading Gen-ZGet in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueenMolly Rhoads - www.linkedin.com/in/molly-rhoads-9294471b4Queens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn – https://www.linkedin.com/company/thecyberqueens/ Calls to Action:Newsletter for exclusive insight and new episodes! https://www.cyberqueenspodcast.com/Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, The Cyber Queens share the benefits of creating a personal brand and why it is important. What is a personal brand? A personal brand is the building blocks that will lead to success for your future! There are so many reasons to create one but always remember that a personal brand is how others perceive you. You will hear some tips on how to build your own personal brand along with our experiences with creating ours. Take the first step towards shifting from not what or who you know to what people know about you!After listening to this episode, we would love to hear your feedback & if you think we should do a part two on personal branding! Otherwise, we guess we won't....Key Topics:What is a personal brand?What do you want others to say about you when you aren't in the room?Why is it important to have a personal brand?Shift from not what or who you know to what people know about you!Advice on building one from the beginning. Tips to build a personal brand!Brand as a woman versus cyber pro Links & Mentions:What is a personal brand? - Forbes8 Tips To Build a Personal Brand - Maril Vernon (resident branding expert and former Brand and Social Media Manager for Caesars Entertainment before her cyber life)Alissa Valentina Knight - Former hacker and current infosec film directorGet in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueenQueens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn Calls to Action:Subscribe to our newsletter for exclusive insight and new episodes!Leave The Cyber Queens feedback!! We respond to any & all feedback! Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, we hope that you learn a thing or two and we have a big surprise for you! This episode dives deep into the misinformation that in order to “break into cybersecurity” you must have a completed bachelor's degree, or a certain certification, or frankly “3 years worth of knowledge” in several areas such as coding. We will discuss the alternative paths and programs you have available to you along with explaining how we each entered cybersecurity. We will discuss that there are bootcamps and certifications that you can obtain to get your foot in the door. You will hear the pros and cons of a four-year degree track vs the bootcamp track. Also, we will touch on how you can identify the path/program that fits you so you can take off running! Grab a notepad and take notes because you will not want to miss a thing!Key Topics:Breaking Into Cybersecurity With or Without Degrees or Certifications, Are They Needed?What Education/Skills Each Cyber Queen Brought to the Cyber IndustryPotential Paths/Avenues to ConsiderWhat to Look for in Different ProgramsPros & Cons of the Four-Year Degree Track vs the Bootcamp TrackDebunking of Job Postings Requiring Years of Experience & Degrees for Entry LevelLearning From People in The Cyber Field The Queens Suggest How to Identify a Program That Fits YouGet in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueenQueens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn – https://www.linkedin.com/company/thecyberqueens/ Amber DeVilbiss - @engineeramberCalls to Action:Subscribe to our newsletter for exclusive insight and new episodes! https://www.cyberqueenspodcast.com/Teach Kids Tech https://teachkidstech.net/books to Purchase The Little Cyber EngineerUdemy - https://www.udemy.com/ ISSA Colorado Springs Chapter - https://issa-cos.org/ Firewalls For Dummies Book = https://tinyurl.com/56zxu8uw Modern Malware For Dummies Book = https://tinyurl.com/225fhc5w Electromagnetism For Babies - https://tinyurl.com/529xm2k4 Cell Biology for Babies - https://tinyurl.com/cr98fbyn The Phoenix Project - https://tinyurl.com/ytv5ktrx The Unicorn Project - https://tinyurl.com/bdhzftv6 Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, we discuss the importance of finding your work/life balance and how to identify the signs of burnout. With October being ADHD Awareness Month, we felt it was necessary to touch on mental health overall. With so many people #QuietQuitting and so many open positions in cyber we cannot afford to avoid supporting people with their mental health. We know that Gen-Z will put their mental health before work and they value the work/life balance. So tech companies- be ready!Key Topics:Struggling to Find The Work/Life BalanceAvoiding BurnoutWhy #QuietQuitting is Toxic!Mental Health is no Longer important in The WorkplaceEmployers Shaming Employees to Take on More WorkTaking Vacation From Medication – What is it?Final TakeawaysChapter Markers:00:00 – The Cyber Queens Introduction & The Cyber Queens Brief Bios03:44 – Struggling to Find The Work/Life Balance04:01 – Maril Mentions When She Worked for Zoom & Being Highly Encouraged to Use UPTO. (No Confidential Information About the Company was Discussed)06:11 – Nathalie Mentions When How She Became Burned out09:24 – Erika Mentions Millennials vs Gen-Z Work/Life Balance09:57 - #QuietQuitting What is it Really?11:45 – Mental Health is no Longer Important in The Workplace12:54 – How Employers Shame Employees into Taking on More Work16:38 – Know The Signs of Burnout & How We Recognize It23:13 – Taking Vacation From Medication – What is it?29:42 – Final TakeawaysGet in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueenQueens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn – https://www.linkedin.com/company/thecyberqueens/ Calls to Action:Newsletter for exclusive insight and new episodes! https://www.cyberqueenspodcast.com/LinksAmber DeVilbiss Reel - https://www.tiktok.com/@engineeramber/video/7141220899616771374?_t=8WNUUOKjsfC&_r=1Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **We probably had the most fun we've ever had recording this episode around why ADHD in cyber is relevant! Your queens had an amazing Gen-Z guest Sara Abrams (@blackjackhacker) who dives into her journey into cyber. Sara Abrams is a former social worker who transitioned into cyber to become a cybercrime investigator.In this episode, we dive into the real facts of ADHD and why so many women are diagnosed later in life. We briefly touch on some of the symptoms girls/women experience but how this can help you jump right into cyber with us! LEEEEZZZ GOOOOO!!!!!!!!!!!! Key Topics:Cyber Queens IntroGuest IntroWhat is ADHD?Common Symptoms in Girls/WomenWomen Tend to be Diagnosed Much Later in LifeFinal Thoughts Get in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueenSara Abrams - @blackjackhacker or www.linkedin.com/SaraCyber Queens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn – https://www.linkedin.com/company/thecyberqueens/ Calls to Action:Newsletter for exclusive insight and new episodes! https://www.cyberqueenspodcast.com/Previous Episodes: E1: https://www.youtube.com/watch?v=ccUs2SjMwDkE2: https://www.youtube.com/watch?v=zTSWzXO3TnQ E3: https://youtu.be/f-cTvg71etQE4: https://youtu.be/rX4VJ0UNVOw Links: Sarah's ADHD Mindset Coach: https://www.linkedin.com/in/adhdmindsetcoach/ You Mean I'm Not Lazy, Stupid or Crazy?! By Kate Kellyhttps://www.amazon.com/You-Mean-Lazy-Stupid-Crazy/dp/0743264487 Maril's NLP Therapist: https://www.samevansglobal.com/Unf*ck Your Brain: Getting Over Anxiety, Depression, Anger, Freak-Outs, and Triggers with science https://www.amazon.com/Unfuck-Your-Brain-Depression-Freak-Outs/dp/1621063046/ref=sr_1_1?crid=2UGVEV6OL1C59&keywords=unfuck+your+brain&qid=1664897210&qu=eyJxc2MiOiIyLjQ1IiwicXNhIjoiMS44OCIsInFzcCI6IjEuOTkifQ%3D%3D&sprefix=unfuk+your+brain%2Caps%2C127&sr=8-1Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, your queens will practically prepare you for the interview question, “What are your salary requirements?” Maril & Nathalie are joined by guest Claire Southwell (@ClaireSouthwe11) as they take the cybersecurity salary myths head-on to give you more realistic expectations as you explore and enter the field. Claire also shares her journey into cybersecurity and advice on evaluating entry-level positions based on not only salary but total compensation. From this episode listeners will get a good understanding of realistic salaries for entry levels of experience and ancillary benefits you should look for at the same time. Key Topics:Everyone wants to make 100k starting outClaire Southwell talks briefly about her cybersecurity journeyWhat are things you should look for instead?Total compensation packageInterview Question: “What are your salary requirements?”Final takeawaysChapter Markers:00:00 – The Cyber Queens Introductions & Guest Claire Southwell00:45 – So you think you'll make $100K right away? Debunking this expectation starts now04:41 – Claire Southwell talks briefly about her cybersecurity journey09:58 – What things should you look or ask for instead?22:00 – Total Compensation24:28 – Interview Question: “What are your salary requirements?”26:42 – Final takeawaysGet in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueen Queens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn – https://www.linkedin.com/company/thecyberqueens/ Calls to Action:Newsletter for exclusive insight and new episodes! https://www.cyberqueenspodcast.com/Previous Episodes: E1: https://www.youtube.com/watch?v=ccUs2SjMwDkE2: https://www.youtube.com/watch?v=zTSWzXO3TnQ E3: https://youtu.be/f-cTvg71etQ Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **There is a trend in cyber looking for professionals who can speak about technical concepts in layman terms to non-technical stakeholders and customers; something many technicians are uncomfortable with. But in this episode, Maril & Nathalie discuss a crucial skill that's losing its prominence in the balance which is talking technically to technical audiences. The importance of the ability to learn and speak to the technical jargon is stressed for anyone entering cybersecurity. We also touch on the importance of situational awareness to build a solid foundation in your cybersecurity journey. Key Topics:Many cyber pros lack the ability to speak in layman termsLayman roles deal with tech personnel and are elevating into technical leadership Speaking technically to technical audiences is importantPentester: stakeholder/exec/AND technicalSituational awareness & learning the tech jargon to build a solid foundationGen-Z the reason talking technically applies to you & why the masses cannot tolerate your generationFinal ThoughtsChapter Markers:00:00 – Introductions01:00 – Many cyber pros lack the ability to speak in layman terms04:10 - Speaking technically to technical audiences is importantPentester: stakeholder/exec/AND technical05:45 & 08:00 – Briefly Touch on Technical Vocabulary/Acronyms (included below)10:02 – Situational awareness & learning tech jargon to build a solid foundation16:43/18:00 - Gen-Z the reason talking technically applies to you & why the masses cannot tolerate your generation23:00 – Final thoughtsGet in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueen Queens Insta- @thecyberqueensQueens Twitter - @TheCyberQueensQueens TikTok – @thecyberqueensQueens LinkedIn – https://www.linkedin.com/company/thecyberqueens/ Calls to Action:Newsletter for exclusive insight and new episodes! https://www.cyberqueenspodcast.com/Previous Episodes: E1: https://www.youtube.com/watch?v=ccUs2SjMwDkE2: https://www.youtube.com/watch?v=zTSWzXO3TnQ Links:A+ Certification | https://www.comptia.org/certifications/a Network+ Certification | https://www.comptia.org/certifications/network Security+ Certification | https://www.comptia.org/certifications/security Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. *****DISCLAIMER: This episode is not about our feels of the overturn or any political views.***In this episode, we discuss the implications this overturn will have on data privacy and employee's personal data within the workplace. We will touch on the challenges with data privacy in State/Federal Government vs. Local Government. Throughout this episode, you will hear us mention several data breaches in private and public industries and why you should be concerned when a decision like this is made. Finally, you will be introduced to some acronyms/regulations that have been created to protect personal and private data.Key PointsCIA Triad & State/Local Government ImplicationsThe Lingo – PHI, HIPAA, The Privacy RuleState & Federal Governments vs. Local GovernmentTop 10 Government Data Breaches# 10: State of Texas - 3.5 million affected (April 2011) #9 : South Carolina Department of Revenue - 3.6 million affected (October 2012) #8: Tricare - 4.9 million affected (September 2011) #7: Georgia Secretary of State Office - 6.2 million affected (November 2015) #6: Office of the Texas Attorney General - 6.5 million affected (April 2012) #5: Virginia Department of Health Professions - 8.3 million affected (May 2009) #4: U.S. Office of Personnel Management (OPM) - 21.5 million affected (June 2015) #3: U.S. Department of Veteran Affairs - 26.5 million affected (May 2006) #2: National Archives & Records Administration (NARA) - 76 million affected (October 2009)#1: U.S. Voter Database - 191 million affected (December 2015)Get in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueen CQP IG- https://www.instagram.com/thecyberqueens/ CQP Twitter - https://twitter.com/TheCyberQueens CQP LinkedIn – https://www.linkedin.com/company/thecyberqueens/ CQP TikTok – https://www.tiktok.com/@thecyberqueensCalls to Action:Newsletter Sign-Up: https://www.cyberqueenspodcast.com/Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
Welcome to The Cyber Queens Podcast! Inspiring Gen-Z, women, LGBTQ+ and ethnic minorities to close the gender/representation gap in cyber.**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **Summary:In this episode, we start off strong by identifying where the need for the podcast came from and how we plan to address it head-on. Additionally, we break the misconceptions and stereotypes around working in the various niches of cyber and dive into the many, many, MANY benefits of working in this industry and why we think YOU, Gen-Z, are particularly equipped to address the skills and gender gap currently running rampant in cyber. Your queens will also talk about their personal journeys into cyber & how badass it has been from day one!We're so thrilled to meet you and share our experiences with you and we CANNOT WAIT to see you in future episodes of The Cyber Queens Podcast!Bullet Points of Key Topics:Intro - how the idea for the podcast first came aboutWhy aren't there more women in this field? We're not interested in it because it's “nerdy” Many mid-career pivot into cyber now. What do Gen-Z want in a career?Hard facts:Everything is tech-based. Could you live a day without your phone? Currently we have 90k open cyber jobs and professionalsThe need for cyber pros is expected to grow from 700K to 3.5M by 2030Companies finally see they can't underpay for crucial skills and you can make $90k/yr by the time you're 25 and well over $150k by the time you're 30 if you start right out of college.Get in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueen CQP IG- https://www.instagram.com/thecyberqueens/ CQP Twitter - https://twitter.com/TheCyberQueens CQP LinkedIn – https://www.linkedin.com/company/thecyberqueens/ CQP TikTok – https://www.tiktok.com/@thecyberqueensCalls to Action:Subscribe https://www.cyberqueenspodcast.com/Meet the Queens at Uniting Women in Cyber 2022 on Sept 27, 2022 in McLean, VA! (https://thecyberguild.org/uwic/)Links:Cisco Breach https://thehackernews.com/2022/08/cisco-confirms-its-been-hacked-by.html or https://www.beyondtrust.com/blog/entry/cisco-breach-a-cautionary-tale-of-mismanaged-credentials-privileged-identities Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!
Welcome to The Cyber Queens Podcast! Inspiring Gen-Z, women, LGBTQ+ and ethnic minorities to close the gender/representation gap in cyber.**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **Summary:In this episode, we start off strong by identifying where the need for the podcast came from and how we plan to address it head-on. Additionally, we break the misconceptions and stereotypes around working in the various niches of cyber and dive into the many, many, MANY benefits of working in this industry and why we think YOU, Gen-Z, are particularly equipped to address the skills and gender gap currently running rampant in cyber. Your queens will also talk about their personal journeys into cyber & how badass it has been from day one! We're so thrilled to meet you and share our experiences with you and we CANNOT WAIT to see you in future episodes of The Cyber Queens Podcast!Bullet Points of Key Topics:Intro - how the idea for the podcast first came aboutWhy aren't there more women in this field? We're not interested in it because it's “nerdy” Many mid-career pivot into cyber now. What do Gen-Z want in a career?Hard facts:Everything is tech-based. Could you live a day without your phone? Currently we have 90k open cyber jobs and professionalsThe need for cyber pros is expected to grow from 700K to 3.5M by 2030Companies finally see they can't underpay for crucial skills and you can make $90k/yr by the time you're 25 and well over $150k by the time you're 30 if you start right out of college.Get in Touch:Maril Vernon - @SheWhoHacksErika Eakins - @ErikaEakinsNathalie Baker - @TheSOCQueen CQP IG- https://www.instagram.com/thecyberqueens/ CQP Twitter - https://twitter.com/TheCyberQueens CQP LinkedIn – https://www.linkedin.com/company/thecyberqueens/ CQP TikTok – https://www.tiktok.com/@thecyberqueensCalls to Action:Subscribe https://www.cyberqueenspodcast.com/Meet the Queens at Uniting Women in Cyber 2022 on Sept 27, 2022 in McLean, VA! (https://thecyberguild.org/uwic/)Links:Cisco Breach https://thehackernews.com/2022/08/cisco-confirms-its-been-hacked-by.html or https://www.beyondtrust.com/blog/entry/cisco-breach-a-cautionary-tale-of-mismanaged-credentials-privileged-identities Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!