Cyber Security Articles & News

Women in Information Security: Valerie Thomas

In my last interview, I spoke with Jen Fox. She’s a Senior Security Consultant who specializes in compliance.

This time, I had the pleasure of speaking with Valerie Thomas. She has a lot of expertise in both penetration testing and industrial cybersecurity.

Kim Crawley: Please tell me about your cybersecurity role and how you got there.

Valerie Thomas: My current role is an Executive Consultant with Securicon, which equates to the lead technical consultant of the penetration testing group. The majority of my time is spent performing penetration testing and vulnerability assessments of various software and hardware, also known as hacking all the things. Securicon is heavily involved in industrial control systems (ICS) and supervisory control and acquisition (SCADA) spaces, so I spend a lot of time in power plants and other critical infrastructure facilities. My niches are physical penetration testing and social engineering, which means that I get paid to break into buildings.

I wasn’t aware that ethical hacking was a career option until my senior year of college after reading The Art of Deception by Kevin Mitnick. I graduated with a Bachelors Degree in Electronic Engineering and immediately began seeking a network security position. However, this was in the early 2000’s before cybersecurity was a mainstream career field, so a lot of knowledge was obtained by knowing someone who could teach you about ethical hacking and vulnerability assessment. I entered into a Department of Defense internship program for network engineering and basically sought out those who could educate me.

Read the entire cool interview at the source.

Source: tripwire

Topics: software vulnerability, The Art of Deception, ICS, industrial cybersecurity, penetration testing, SCADA, security career, Valerie Thomas, ethical hacking, industrial systems, IoT, keynote speaker, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

4 Ways To Make Your Cyber Security Virtual Event Feel Like It’s an In-Person Experience

Surrounded by the ever-changing state of business operations, planning a cyber security training or educational event can be complicated. One of the c..

Read more ›

Times Your Company May Need a Cyber Security Expert Witness

Expert witnesses are commonplace in the legal world to provide well…expert… insight into cyber scenarios. Because the Average Joe may not know the tec..

Read more ›

What Is a Security Vulnerability Assessment?

When it comes to online security, you want to find the issues before cyber criminals figure it out for you. Penetration tests, or pentests, are annual..

Read more ›
tech-texture-bg