Image description not provided
Submit Your Article Idea
    Login / Sign Up
  • Home
  • News
  • Register Now for Women of Color in STEM
    • Women of Color Magazine
    • Past Women of Color Winners
  • Leading Voices
    • Seminars
    • Articles from Women of Color
  • Women in Finance – Diversity voices
  • Events
    • Submit an Event
  • Lifestyle
    • Tech News
    • Whats Trending?
    • Career Tips
  • Contact

IBM is a great place for women in STEM

Image description not provided
  • Published September 13, 2017
    By : Lango Deen

IBM is a great place for women in STEM, says a new job page on the Women at IBM website.

The company has announced its Tech Re-Entry Program, a 12-week internship for experienced technologists working on high-level projects with a senior-level mentor.

The Society of Women Engineers and iRelaunch, the return-to-work experts, partnered to launch the STEM Re-Entry Task Force with seven founding member companies in the fall of 2015 to make rejoining the tech industry easier for skilled employees who have been out of the workforce.

IBM designed a program that used the best of existing return ships and tailored it to the specifics of working in technology.

The ideal candidate is

  1. Experienced.
  2. Technically adept.
  3. Prepared to lead.
  4. Willing to help.
  5. Ready to go.

As chief information security officer for IBM, Shamla Naidoo protects the company’s digital assets. They include intellectual property systems, data, images, multi-media, and text content files for over 400,000 employees in more than 170 countries. The cyber security sector is booming. Yet women make up only 10 percent of the global workforce.

Contributing to the lack of diversity is that Hispanics, African Americans, and Asian Americans make up only 12 percent of the cybersecurity workforce, which outpaces the general tech sector in its lack of women.

Companies like IBM can’t find enough workers to keep up with demand. By 2020, an estimated 1.5 million positions will be open and unfilled.

Here’s what IBM’s CISO is doing to extend opportunity and encourage participation.

“With that kind of number (1.5 million open jobs) it’s hugely challenging to go to the traditional places where we source talent,” Naidoo said. “So our objective is to look at different ways of recruiting, retention, and ways of motivating people into this field from other fields,” she said.

IBM Initiatives

– Internal programs to motivate IBM employees

– Programs targeting women coming through the ranks in academic institutions

Naidoo recently took over the co-leadership of Women in Science and Engineering (WiSE), which helps her mission to reach women of different backgrounds, and to grow the cyber security portion of an individual’s skills.

“Our objective is to showcase what we do in the field to motivate others to join the field. We also do programs in middle schools and high schools to make cyber security a more visible career path,” she said.

What you need to know

1. Think about how you protect, say, a retail organization. Understanding the area, subject matter, and transactions are key to cyber security.

“You have to understand how people are driven into the retail organization, how they pack shelves and how people might put goods in their pocket and walk out,” she said.
Some time ago Naidoo hired an IBM application developer, who’d been sitting at a desk writing millions and millions of lines of code for years.
“What if I leverage your skills? She asked. “Teach you to separate your code, which would make you an applications security expert?”
Once the programmer was up to speed, Naidoo put him in a team to teach others.
“He understood his subject matter, he knew how developers think, he knew how they construct their code, and he knew how they deploy their code,” Naidoo said. “All he needed to know was how to make that secure out of the gate.”

2. The security industry has room for different types of roles. There are opportunities everywhere.

“In the cybersecurity industry, you need people in the workflow to do project management, incident responders, analysts, developers, programmers, and other skills like strategy, marketing, and finance and not specifically technical roles to make that work,” she said.
“People need to be exposed to how cyber security experts think. How do hackers think? How do the white hackers think?”

3. Be more aware of the processes that go with credit card transactions. Look at how your data is stored, question where the potential is for exposure.

4. There’s a lot of digitization that goes with every interaction with digital assets and you will find it in the most unexpected places. That’s how you learn.

Naidoo started her own learning in an entry-level information technology job.

Just out of high school, she saw an ad for a position that needed no experience. It was a computer operator opening supporting processing and retailing of drugs for a pharmaceutical wholesaler that ran a distribution organization.

Naidoo quickly realized that there was a lot more to the job than inputting orders and sending them on their way. She observed the total operations, the different jobs involved and what it took to get the pharmaceuticals out the door.

“There was a programmer who would come in every week, treat the programs on my computer and then reload it with the programs I used to do my job,” she said. “I decided I wanted to do that too.”

There is a huge value in understanding how your company makes money.

Thirty years ago, she worked for a company that got its passwords from factory manuals.

“No one changed passwords back then because it was a shared resource,” she recalled. “So when somebody logged into the system, my job was to find out how they logged in and how to stop it from happening again.”
“When you learn the business it makes the security job a whole lot easier,” she said.

After a management information systems diploma, Naidoo got a double bachelor’s degree in economics and information systems.

Armed with her qualifications, she immigrated to America in the mid-80s gaining experience in managing networks, developing applications, and building firewalls.

Naidoo learned early in her career to do everything through a security lens. Her mantra was “I know how to build it. How can somebody else figure out how to break it?”

“If everyone brings their strengths to the table in this field and shares that with others, you eventually end up with all the strength you need. The need to learn has to combine with the urge to teach.”

Naidoo also adds that teams with equal numbers of women and men are more likely to experiment and be more productive and innovative.

“The differences are what make them powerful,” she said.

“Collaboration is critical to success. People who want to build walls have to be careful because teamwork makes us way more powerful against the global cyber security problem” Naidoo said.
“Be willing to learn, be willing to learn from others, be willing to teach,” she said.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Advertisement

Subscribe

News

Image description not provided

CCG presents: AI Empowerment and Virtual Career Fair

May 09, 2025
Image description not provided

CCG magazine honoree receives Google’s Platinum Leadership Award

May 08, 2025
Image description not provided

Save the Date: Friday, May 9, 2025

May 08, 2025
Image description not provided

AWM is dedicated to sharing 'the joy of math' with teachers and students

May 07, 2025
Image description not provided

Be sure to visit the WOC STEM Nominations Portal today!

May 06, 2025
Image description not provided

Upcoming Event: Friday, May 9, 2025

May 05, 2025
Image description not provided

Nominate innovators and changemakers shaping STEM's future

May 02, 2025
Image description not provided

Don’t miss your chance to nominate someone!

May 01, 2025
Image description not provided

Save the Date: Friday, May 9, 2025

Apr 30, 2025
Image description not provided

Nominate innovators and changemakers shaping STEM's future

Apr 29, 2025
Image description not provided

WOC STEM award winner will examine the emerging field of cancer engineering

Apr 28, 2025
Image description not provided

Save the Date: Friday, May 9, 2025

Apr 25, 2025
Image description not provided

Remembering the 2004 Technologist of the Year on Girls in ICT Day

Apr 24, 2025
Image description not provided

Don’t miss your chance to nominate someone today!

Apr 24, 2025
Image description not provided

Nominate a fintech leader for a 2025 WOC STEM Award

Apr 23, 2025
Image description not provided

Earth Day 2025: "Our Power, Our Planet"

Apr 22, 2025
Image description not provided

Monday is World Creativity and Innovation Day

Apr 21, 2025
Image description not provided

Tamla Olivier named president and CEO of BGE, an Exelon company

Apr 21, 2025
Image description not provided

How a personal connection to autism ignited a passion for STEM and innovation

Apr 18, 2025
Image description not provided

Nominate a fintech leader for a 2025 WOC STEM Award

Apr 17, 2025
Image description not provided

Don’t miss your chance to nominate someone today!

Apr 16, 2025
Image description not provided

Blue Origin hopes to inspire the next generation of dreamers to reach for the stars

Apr 15, 2025
Image description not provided

Don’t miss your chance to nominate someone!

Apr 14, 2025
Image description not provided

The significant contributions of space science and technology

Apr 11, 2025
Image description not provided

WOC Technologist of the Year 1999

Apr 10, 2025

Login

[ajax_login]

Sign Up

[ajax_register]
 
Image description not provided

Sitemap

  • Home
  • Company
  • Career
  • Diversity Solutions
  • Conferences
  • Publications
  • Programs
  • Campus
  • Media

Help and Services

  • Contacts
  • FAQs
  • Employment
  • Feedback
  • Privacy Policy
  • E-mail scams
  • Sitemap

Contact

Career Communications Group,
729 East Pratt Street
Baltimore, MD 21202

© WOC STEM Conference 2025

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie SettingsReject AllAccept

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT