Women In Security Magazine Issue 12

Page 151

Sheida Sabeti was born in Perth and has lived there all her life. She is in the final year of a Bachelor of Science course at Edith Cowan University, majoring in cybersecurity. SHEIDA SABETI Bachelor of Science Student at Edith Cowan University

Suppose you met an old friend from your last year at school who, knowing nothing about cybersecurity or what you do, asks you what you are doing. How do you answer them to ‘sell’ them on the idea of a career in cybersecurity?

personal favourite topic is coding, in various languages.

Is there any aspect of your studies you find particularly difficult or challenging, if so what, and why? I find the networking aspect particularly challenging

Cybersecurity is evolving and we are becoming

because it is the most difficult for me to understand

more technologically advanced every day. As we

and not a topic on which I want to undertake further

continue to advance, new vulnerabilities and threats

research.

are emerging. There are many areas one can explore programming, security consulting and many more.

What is your favourite source of general information about cybersecurity?

Cybersecurity gives people the freedom to explore

My favourite source of cybersecurity information

different areas whilst still gaining experience in a field

would be the Australian Cyber Security Centre

they love.

(ACSC). I find it to be the most reliable because it is

in cybersecurity: governance, penetration testing,

an Australian Government body and anybody can

What cybersecurity role would most like to be hired into when you graduate, and why?

understand the information it provides.

I enjoy a variety of fields, so whilst I do not have a specific role in mind, I would enjoy gaining experience

What measures do you have in place for your personal cybersecurity?

in a vast range of fields including data analysis,

I follow various cyber safety practices. One is

security consultancy and governance.

following password security rules. I ensure I use a minimum of 15 characters including uppercase

Who, or what would you say has had the biggest influence on your cybersecurity career journey to date, and why?

and lowercase letters, numbers and symbols. I

My initial interest in computing grew out of an interest

unknown links I receive. I also perform daily antivirus

in gaming I have had since I was a child. However, I

scans on my desktop computer.

use multifactor authentication. I do not give out personal information unnecessarily and never click on

never considered cybersecurity as a career until my enter and a course I could undertake at university. So

With the benefit of hindsight, would you change your career trajectory to date, and if so now?

I chose computer science ATAR during my final two

Honestly, I would not. When I was younger I would

years of high school. I enjoyed the topics discussed

deliberate on what courses I should study and

because of the way my teacher taught the subject

whether I would like them, but I fell in love with

and made it very enjoyable. I also sought advice from

computing and I would not change what I learnt, the

him regarding which university would be best, as well

people I met and the experiences I gained in any way.

as if it were a good course to take.

It has shaped me into the person I am today.

mother suggested it. She knew it was a good field to

What aspect of your studies excites you the most?

www.linkedin.com/in/sheida-sabeti-b7659420b

The ability to learn a multitude of topics. However, my

I S S U E 12

WOMEN IN SECURITY MAGAZINE

151


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Saman Fatima

4min
pages 154-155

Roshni Bedi

6min
pages 148-150

Tshering Wangmo

6min
pages 152-153

Savannah Dockerty

3min
pages 146-147

Sheida Sabeti

2min
page 151

BISO – no that is not a typo

9min
pages 126-130

Different perspectives

10min
pages 136-140

Identity proofing, identity verification and fraud prevention

5min
pages 131-133

Incident response competition

6min
pages 141-145

managing risk and resilience

8min
pages 116-119

a rewarding profession

3min
pages 134-135

Taking a proactive approach to cybersecurity

3min
pages 114-115

or nothing

3min
pages 108-109

Engagement with an impersonator

8min
pages 100-103

changing career through recruitment

6min
pages 76-78

Balancing risk and productivity in a hybrid world

4min
pages 106-107

experience and professional fulfillment

3min
pages 104-105

Don’t get poor fast

3min
pages 90-91

material risk grows

3min
pages 92-93

after 12 years in finance

2min
pages 74-75

Why I became a cybersecurity expert

2min
pages 72-73

operator in the Australian Army Reserves

3min
pages 64-65

early careers

10min
pages 66-71

Cyber is not your get-rich-quick option

3min
pages 62-63

Reshmi Hariharan

4min
pages 50-51

Farah Chamseddine

4min
pages 48-49

Martina Saldi

4min
pages 46-47

Holly Wright

5min
pages 44-45

Dr Fauzia Idrees Abro

1min
page 43

Johanna Williamson

6min
pages 40-42

Get-rich-quick crypto scams

2min
pages 14-15

Lisa Ventura

3min
pages 30-31

Catherine Dawson

3min
pages 38-39

Rachael Greaves

6min
pages 35-37

Belinda Stewart

3min
pages 20-21

Kao Hansell

3min
pages 16-17

Jenna Salvesen

6min
pages 32-34

Melanie Truscott

4min
pages 18-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.