Cyber Feminist Hacker and New Course Contributor: Magda Lilia CHELLY

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Cyber Feminist Hacker and New Course Contributor: Magda Lilia CHELLY

Author: Olivia | Published on April 17, 2017 | Views: 5989

Cyber feminism, used to describe the philosophies of a contemporary feminist community whose interests are cyberspace, the Internet and technology, is most likely not a term you’ve heard too often, but it’s gaining traction thanks to women in cyber like Magda Lilia CHELLY (@responsiblecyber).

social-engineeringMagda, who describes herself as the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night, is the course creator of Cybrary’s newest user- generated course, Advanced Social Engineering Tactics.

Her credentials are very expansive. Aside from holding a PhD in Telecommunications Engineering with a subsequent specialization in cyber security and being fluent in 5 languages, Magda was a nominee of the Global Leader of the Year at the Women in IT Awards 2017.

Recently, she launched a cyber security diploma program in Singapore with Trent Global College, and a global partnership with K2 Partnering Solutions for cyber educational programs, and organizational design.

“Cyber Security has always been a passion, and I have the chance today to run a business around that topic,” says Magda, “I spend most of my time raising security awareness on a global scale, and supporting chief information security officers in their cyber security strategy and roadmap.”

That is where her business plays an important role.

Currently based in Singapore, Responsible Cyber Pte.  operates with a global reach in 19 locations worldwide and provides three main services: cyber security advisory, cyber security education, and cyber security organizational design.

“Working and supervising various projects within my organization, I touch base to new technologies every day. Being very technical, I have evolved in that direction. Providing cyber security services to corporations made me realize an important point: the human factor. In fact, I have decided to specialize myself in cyber change management programs,” shares Magda.

Among her responsibilities, Magda is involved in many areas from developing her own websites to reviewing penetration testing methodologies.  Her involvement in any given cyber security project varies from very technical to more managerial and advisory.

At a high-level, Responsible Cyber is focused on the human factor in cyber security, driving complete security assessments, hosting cyber awareness programs, and addressing challenges for mergers and acquisitions, among many other services.

Visit the Responsible Cyber CH4NN3L for more information, here.

As for Magda, she jokes that her personal journey in cyber security began trying to hack her ex-boyfriend’s accounts. In fact, her entrance into cyber security began in a more traditional way, as she was introduced to information security in her studies.

“I was attracted by the knowledge behind it [cyber security] and all the possibilities to access systems,” Magda explains.

Her inspiration for the Advanced Social Engineering Tactics Micro Certification course stemmed from an interest in the human factor, as well as the many methods for system access.

This course looks specifically at social engineering in-depth, positioning one to understand and prepare against any type of confidence trick for the purpose of information gathering, fraud, or system access, as it differs from a traditional ‘con’ in that it is often one of many steps in a more complex fraud scheme.

From Magda’s experience and customer’s feedback, “Cyber attacks most frequently have two phases. The first phase will focus on information gathering. For this purpose, cyber criminals use social engineering. The second phase, is based on traditional hacking and technical attacks. This course offers more insight on the social engineering factor, and explains reasons of success, and philosophy behind these attacks.”

Jokingly, Magda kids her course is unique because of her. magda_chelly_photo

“Let’s be serious. This course gives a different perspective. I am discussing the cultural importance in social engineering attacks. In fact, we have discovered that crime rate is related to the effectiveness of a social engineering attack. People tend to mirror their actions online. Therefore, when a person lives in a very safe environment, they will trust people more easily. This is a big risk for online communications, as the Internet doesn’t have borders. The course addresses these factors, explaining why a social engineer would choose one location rather than another and how that will be an important reason for his success.”

A key takeaway to remember is that everyone is a target, and even a security professional can be target for social engineering attacks, especially as criminal’s strategies get more effective and realistic.

Magda answers more questions on her experience as a cyber feminist hacker and her experience with the course creation process below.

If you’d like to keep up with her latest happenings, you can follow her on Twitter @MagdaCHELLY.

What has your experience as a woman in cyber been like?

My experience as a woman in cyber was and is exciting every day. It is definitely full of surprises. From feedback like, “We want you as our keynote speaker,” I always have taken these opportunities positively.

I always say, you do not need to prove anything to anyone. You know your value as a professional with your own credentials. Your achievements will speak by themselves.

I have been mentored and supported by men in the industry, and built a recognized personal brand across the world.

Why should more women get into cyber?

Today, we have 11% of women in the industry. Is that enough? Of course it isn’t. The reasons are various, from a lack of opportunities at a young age to some cultural barriers.

My platform, woman-in-cyber.com is helping young ladies with mentoring opportunities, and role models who share their experience and achievements. From my perspective, it is all about changing the perception that cyber security is a man’s job.

How can women become more involved?

We will not change the world over night. These are facts. History is made. We need to implement small steps every day and support each other in these diversity initiatives.

Three main points are very important to be involved as a woman in cyber:

  1. Build your own brand and become an industry recognized professional.
  2. Build your confidence and believe in yourself, even in a room full of men.
  3. Endorse and encourage other women in the room.

These three points are important steps, making a difference and bringing more opportunities for women to evolve in the space.

cyber_womanWhat motivates you to share your knowledge with others?

I believe everyone is entitled to learn. Knowledge should be shared and free. This is definitely the best way to change the world and make it a better place.

Education should be accessible to people wherever they are and without spending huge budgets creating constraints for the rest of their lives.

We do have some of the best brains in countries where unfortunately the average salary doesn’t exceed $300 per month. I consider that giving equal opportunities to learn to everyone should take that into consideration. This is also the reason for launching women-in-cyber.com. I am encouraging equal rights to learn cyber security for women, across the world.

What have you found most helpful in learning new technologies and skills?

I have always recommended platforms like Cybrary, which obviously is my favorite, aside from my course being hosted on the site. I have used the platform from the beginning and I find it very useful and a great initiative.

On the other hand, I do encourage communicating and exchanging with industry professionals. We learn from others’ experiences.

Why do you believe learning Social Engineering is important?

Most cyber attacks stem from people, and in social engineering attacks, the primary focus is deception. The best way to not become a victim is to learn about social engineering and understand the tactics so you can recognize and avoid them.

Advice for other Cybrarians:

Cybrary is a fabulous opportunity to learn. Knowledge is power. Study to learn, and be curious about everything, in this case, cyber security. It is a rare opportunity and we should be extremely appreciative to have a free platform with high-quality content.

Do not miss it, and get your micro-certifications.

Perhaps most importantly, Magda closes by advising “I would say that everyone can start a career in cyber security. Just take the first step and join our community.”

For those of you who want to share your knowledge and expertise like Magda did, you can now create your very own course on Cybrary. To submit your topic and begin the creation process, click here.

In future blog posts, I will continue to feature other course creators, as well as other women in cyber.

olivia2

Olivia Lynch (@Cybrary_Olivia) is the Marketing Manager at Cybrary. Like many of you, she is just getting her toes wet in the field of cyber security. A firm believer that the pen is mightier than the sword, Olivia considers corny puns and an honest voice essential to any worthwhile blog.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel