Women In Security Magazine Issue 3

Page 37

W H AT ’ S

H E R

J O U R N E Y ?

part!) of cybersecurity, the technology that protects our secrets and communications in our daily life.

Giulia Traverso PhD- Senior Consultant Cybersecurity, EY

By becoming a cryptographer I (finally) officially became part of the cybersecurity workforce. However, this took a few more years. After my master’s degree, I did not feel ready for a job in the industry. I wanted to explore cryptography more deeply, and contribute to it. So I decided to do a PhD in cryptography.

H

Armed with a PhD I had two main options to become part of the cybersecurity workforce: pursue a career ow do you become a “cybersecurity

in academia and become a professor or move into

expert”? The journey that would lead me

the industry. Those who decide to stay in academia

into working in this field started more

are at the forefront of innovation. They are the folks

than fifteen years ago, when nobody

inventing new primitives, proving the security of these,

was taking about cybersecurity. I wasn’t

and equipping them with more and more desirable

aware of it either. I stumbled upon cybersecurity by

and sophisticated features. Those who move into the

chance.

industry implement cryptography in to protect real

My journey began fifteen years ago when, after middle

data and processes.

school, I had to choose what type of high school to

I belong to the latter group. After my PhD, I joined a

attend. A school with a strong scientific or technical

cybersecurity startup to manage its R&D projects,

background, you might think. Well, no. Unbelievable

adding security to embedded technologies, such

as it may sound, I opted for the so-called “Classic

as IoT and AI. At the time of writing, I am about

Lyceum”. In Italy, where I was raised, a Classic Lyceum

to join a Big Four consulting firm where I will be

is a high school with a strong focus on literature,

dealing with compliance to cybersecurity standards

ancient Greek, Latin, philosophy and history, and

and regulations for major banks and insurance

only five hours per week of mathematics, physics

companies.

and science. After completing my five year stint at the school I knew that “cryptography” came from the Greek root “crypt-”, which means to hide, and that “cybersecurity” came from the Greek root “cyber-“, which means to govern, to pilot. At age nineteen, that was all I knew about cybersecurity. My journey towards my current field of expertise started slowly and unconsciously when I decided to enrol for a bachelor’s degree in mathematics at the university. At least I was in the STEM field and one of the (supposedly) few women in STEM. In fact, half the students in the mathematics faculty were women. My interest started to shift to cybersecurity when I decided to study for a master’s degree in

My career path shows there are many ways to becoming a cybersecurity expert. So I hope I’ve shown you there is much more to working in cybersecurity than hacking and programming all day long. There are theoretical and strategic roles. Cybersecurity is a discipline where knowledge and competence count for more than degrees and certificates, and where career progression is not closely tied to specific study paths. Therefore, if you’re passionate about cybersecurity or simply interested in it, please just go for it! Study on your own, take online classes, read books, ask people on LinkedIn. A career in cybersecurity is closer than you can imagine.

mathematics for cryptography. Studying for my bachelor’s degree I had found subjects like number theory, finite fields, and algebra very interesting. Those are the mathematical foundations of cryptography, the core (and the best

www.linkedin.com/in/giulia-traverso-phd-13a749150/

www.breakingthirty.com

WOMEN IN SECURITY MAGAZINE

37


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Surviving a crisis - a view from the trenches

6min
pages 120-123

Are you doing enough to protect your organisation’s IT security?

2min
pages 118-119

Take me to cuba

6min
pages 111-113

Whose afraid of Zero Day

6min
pages 114-117

How to embrace the coming technology revolution

4min
pages 108-110

Linking data privacy to security

3min
pages 106-107

transforms cybersecurity

8min
pages 102-105

Back to basics

6min
pages 99-101

AusCERT plenary panel

6min
pages 96-98

Hackers are not who you think they are

2min
pages 91-95

Celebrating information security excellence in 2021

9min
pages 86-89

Factors threatening effective partnerships in crisis situations

2min
page 90

AWSN returning to in-person events around Australia

3min
pages 84-85

Building relationships in the security and risk suite and why it matters

4min
pages 80-81

fighting for women in STEM

8min
pages 76-79

Ten top tips to secure your website

3min
pages 74-75

How SiteMinder’s product and technology teams stayed motivated and innovative during the pandemic, while servicing the traditional hotel industry

5min
pages 72-73

Top 5 digital parenting tips for parents with teens

2min
pages 64-65

Lisa Jiggetts

5min
pages 54-57

Could inclusivity expand the cybersecurity talent pool in australia?

3min
pages 60-61

A Tuesday in the life of a Regional Technical Support Manager

5min
pages 62-63

How to make a midcareer move into cybersecurity

3min
pages 58-59

Gergana Winzer

7min
pages 46-49

Noushin Shabab

4min
pages 52-53

Christina Keing

4min
pages 50-51

Dr Lesley Seebeck

6min
pages 40-41

Anna Liebel

4min
pages 32-33

Jo Stewart-Rattray

5min
pages 34-36

Daniella Traino

6min
pages 30-31

Giulia Traverso

3min
page 37

Shelly Mills

5min
pages 38-39

How to create a culture of belonging and why it matters

8min
pages 18-21

Beware of ransomware

2min
pages 16-17

more diverse workforces

4min
pages 12-15
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.