SlideShare a Scribd company logo
1 of 1
Download to read offline
Women’s Security Society Career Pathways Scheme
Cath has over 15 years experience in the cyber security profession having
worked for both UK Government and the private sector. A thought leader in her
field, she frequently speaks at security and internet conferences and has
provided articles and comments for multiple publications. Her career was
recently profiled in the Financial Times and she was interviewed by BBC world
promoting women into the IT profession.
Cath currently works as Head of Information Security for Nominet UK, the
internet company best known for running the ‘dot.uk’ registry and therefore
critical to internet operations in the UK. Prior to joining Nominet, Cath worked at
GCHQ holding a variety of posts in the field of cyber security. Cath has a BSc in
Mathematics, an MSc in Human Computer Interaction and is CISSP qualified. She
was awarded security champion at the women in IT awards 2015.
Her approach to security is distinctive in that she emphasises education and
collaboration, despite the challenges of doing so in a highly technical field.
Internally, she champions security awareness, describing staff as “the first and
most important line of defence”. Nominet’s staff training program to mitigate the
risk of social engineering attacks has been held up as an example internationally
Cath recently applied and was successful in joining the Board of the Women’s
Security Society. She strongly believes in the philosophy and approach of the
group and hopes to encourage more members, particularly in the area in which
she resides, the West of England.
The WSS Career Pathways scheme is a direct initiative following a request from
the membership and we at the WSS are so looking forward to watching it grow
and thrive!

More Related Content

What's hot

CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010segughana
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurityTobia La Marca
 
Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber securityTobia La Marca
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityShashank V M
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)Pedro Silva
 
Open Contracting and Data Standards: Lessons from the International Aid Trans...
Open Contracting and Data Standards: Lessons from the International Aid Trans...Open Contracting and Data Standards: Lessons from the International Aid Trans...
Open Contracting and Data Standards: Lessons from the International Aid Trans...ocdata
 
British council approval
British council approvalBritish council approval
British council approvalPrince Bertrand
 
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...Angelo Settembre
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondBenjamin Ang
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
Intro to cybersecurity
Intro to cybersecurityIntro to cybersecurity
Intro to cybersecurity
 
Intro to cyber security
Intro to cyber securityIntro to cyber security
Intro to cyber security
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
Cyber Sercurity
Cyber SercurityCyber Sercurity
Cyber Sercurity
 
Personal cyber safety
Personal cyber safetyPersonal cyber safety
Personal cyber safety
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)Pedro silva introduction to -certificate (1)
Pedro silva introduction to -certificate (1)
 
Open Contracting and Data Standards: Lessons from the International Aid Trans...
Open Contracting and Data Standards: Lessons from the International Aid Trans...Open Contracting and Data Standards: Lessons from the International Aid Trans...
Open Contracting and Data Standards: Lessons from the International Aid Trans...
 
British council approval
British council approvalBritish council approval
British council approval
 
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
Certificate of Course Completion "Introduction to Cybersecurity" powered by C...
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 

Similar to WSS Career Pathways Bio

The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdfThe Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdfInsightsSuccess4
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
Top Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETop Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETopCyberNewsMAGAZINE
 
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKWomen in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKCaroline Rivett
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfCIO Look Magazine
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsDale Butler
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsPeteAndersen
 
Study master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarshipStudy master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarshipnewedgecs
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
The Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfThe Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfthesiliconleaders
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofDominic Vogel
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015Dale Butler
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdfHow Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdfAnudipF
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapitolTechU
 

Similar to WSS Career Pathways Bio (20)

The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdfThe Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
Top Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBETop Cyber News Magazine Christiane Wuillamie OBE
Top Cyber News Magazine Christiane Wuillamie OBE
 
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKWomen in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
 
The 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdfThe 10 Most Influential People in Cyber Security, 2023.pdf
The 10 Most Influential People in Cyber Security, 2023.pdf
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
Study master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarshipStudy master of cyber security at australia with scholarship
Study master of cyber security at australia with scholarship
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
The Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfThe Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdf
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdfHow Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
 

WSS Career Pathways Bio

  • 1. Women’s Security Society Career Pathways Scheme Cath has over 15 years experience in the cyber security profession having worked for both UK Government and the private sector. A thought leader in her field, she frequently speaks at security and internet conferences and has provided articles and comments for multiple publications. Her career was recently profiled in the Financial Times and she was interviewed by BBC world promoting women into the IT profession. Cath currently works as Head of Information Security for Nominet UK, the internet company best known for running the ‘dot.uk’ registry and therefore critical to internet operations in the UK. Prior to joining Nominet, Cath worked at GCHQ holding a variety of posts in the field of cyber security. Cath has a BSc in Mathematics, an MSc in Human Computer Interaction and is CISSP qualified. She was awarded security champion at the women in IT awards 2015. Her approach to security is distinctive in that she emphasises education and collaboration, despite the challenges of doing so in a highly technical field. Internally, she champions security awareness, describing staff as “the first and most important line of defence”. Nominet’s staff training program to mitigate the risk of social engineering attacks has been held up as an example internationally Cath recently applied and was successful in joining the Board of the Women’s Security Society. She strongly believes in the philosophy and approach of the group and hopes to encourage more members, particularly in the area in which she resides, the West of England. The WSS Career Pathways scheme is a direct initiative following a request from the membership and we at the WSS are so looking forward to watching it grow and thrive!