Ready to Start Your Career?
April 17, 2017
Cyber Feminist Hacker and New Course Contributor: Magda Lilia CHELLY
April 17, 2017
April 17, 2017
Cyber feminism, used to describe the philosophies of a contemporary feminist community whose interests are cyberspace, the Internet and technology, is most likely not a term you’ve heard too often, but it’s gaining traction thanks to women in cyber like Magda Lilia CHELLY (@responsiblecyber).Magda, who describes herself as the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night, is the course creator of Cybrary’s newest user- generated course, Advanced Social Engineering Tactics.Her credentials are very expansive. Aside from holding a PhD in Telecommunications Engineering with a subsequent specialization in cyber security and being fluent in 5 languages, Magda was a nominee of the Global Leader of the Year at the Women in IT Awards 2017.Recently, she launched a cyber security diploma program in Singapore with Trent Global College, and a global partnership with K2 Partnering Solutions for cyber educational programs, and organizational design.“Cyber Security has always been a passion, and I have the chance today to run a business around that topic,” says Magda, “I spend most of my time raising security awareness on a global scale, and supporting chief information security officers in their cyber security strategy and roadmap.”That is where her business plays an important role.Currently based in Singapore, Responsible Cyber Pte. operates with a global reach in 19 locations worldwide and provides three main services: cyber security advisory, cyber security education, and cyber security organizational design.“Working and supervising various projects within my organization, I touch base to new technologies every day. Being very technical, I have evolved in that direction. Providing cyber security services to corporations made me realize an important point: the human factor. In fact, I have decided to specialize myself in cyber change management programs,” shares Magda.Among her responsibilities, Magda is involved in many areas from developing her own websites to reviewing penetration testing methodologies. Her involvement in any given cyber security project varies from very technical to more managerial and advisory.At a high-level, Responsible Cyber is focused on the human factor in cyber security, driving complete security assessments, hosting cyber awareness programs, and addressing challenges for mergers and acquisitions, among many other services.Visit the Responsible Cyber CH4NN3L for more information, here.As for Magda, she jokes that her personal journey in cyber security began trying to hack her ex-boyfriend’s accounts. In fact, her entrance into cyber security began in a more traditional way, as she was introduced to information security in her studies.“I was attracted by the knowledge behind it [cyber security] and all the possibilities to access systems,” Magda explains.Her inspiration for the Advanced Social Engineering Tactics Micro Certification course stemmed from an interest in the human factor, as well as the many methods for system access.This course looks specifically at social engineering in-depth, positioning one to understand and prepare against any type of confidence trick for the purpose of information gathering, fraud, or system access, as it differs from a traditional ‘con’ in that it is often one of many steps in a more complex fraud scheme.From Magda’s experience and customer’s feedback, “Cyber attacks most frequently have two phases. The first phase will focus on information gathering. For this purpose, cyber criminals use social engineering. The second phase, is based on traditional hacking and technical attacks. This course offers more insight on the social engineering factor, and explains reasons of success, and philosophy behind these attacks.”Jokingly, Magda kids her course is unique because of her. “Let’s be serious. This course gives a different perspective. I am discussing the cultural importance in social engineering attacks. In fact, we have discovered that crime rate is related to the effectiveness of a social engineering attack. People tend to mirror their actions online. Therefore, when a person lives in a very safe environment, they will trust people more easily. This is a big risk for online communications, as the Internet doesn’t have borders. The course addresses these factors, explaining why a social engineer would choose one location rather than another and how that will be an important reason for his success.”A key takeaway to remember is that everyone is a target, and even a security professional can be target for social engineering attacks, especially as criminal’s strategies get more effective and realistic.Magda answers more questions on her experience as a cyber feminist hacker and her experience with the course creation process below.If you’d like to keep up with her latest happenings, you can follow her on Twitter @MagdaCHELLY.What has your experience as a woman in cyber been like?My experience as a woman in cyber was and is exciting every day. It is definitely full of surprises. From feedback like, “We want you as our keynote speaker,” I always have taken these opportunities positively.I always say, you do not need to prove anything to anyone. You know your value as a professional with your own credentials. Your achievements will speak by themselves.I have been mentored and supported by men in the industry, and built a recognized personal brand across the world.Why should more women get into cyber?Today, we have 11% of women in the industry. Is that enough? Of course it isn’t. The reasons are various, from a lack of opportunities at a young age to some cultural barriers.My platform, woman-in-cyber.com is helping young ladies with mentoring opportunities, and role models who share their experience and achievements. From my perspective, it is all about changing the perception that cyber security is a man’s job.How can women become more involved?We will not change the world over night. These are facts. History is made. We need to implement small steps every day and support each other in these diversity initiatives.Three main points are very important to be involved as a woman in cyber:
- Build your own brand and become an industry recognized professional.
- Build your confidence and believe in yourself, even in a room full of men.
- Endorse and encourage other women in the room.
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry