Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Special Report

Zinet Kemal | Women in Security 2024

Cloud Security Engineer — Best Buy

By Taelor Sutherland
Zinet Kemal | Cloud Security Engineer — Best Buy

CreativeDesignArt / DigitalVision Vectors / via Getty Images
Bio image courtesy of Kemal 

July 2, 2024

Keeping future generations safe online

Zinet Kemal immigrated to the U.S. from Ethiopia 10 years ago, deciding to pivot from her decade-long legal career while raising her four children. Once in the U.S., Kemal completed an additional undergraduate degree in computer science, which first introduced her to security.

“I was participating in an extracurricular activity within my college; it was a cyber defense competition. That’s when I got exposed to the world of cybersecurity and security and I began working on security certifications,” Kemal says.

Kemal’s first security role was with the Minnesota state government, doing information security auditing within the organization. Six months later, Kemal was promoted to Senior Information Security Engineer at the state government where she worked in application security at the state government before moving to the cloud space, where she currently works as a Cloud Security Engineer at Best Buy.

“What I do in a nutshell high level is making sure that we’re collaborating with other engineers from the same organization to make sure that the cloud migration is done securely. A lot of the challenges within cloud security is misconfiguration, or things that could be preventable if the right guard rails are implemented in the security environment that we're operating,” Kemal says.

When the pandemic hit, Kemal turned to writing. She’s published three children’s books since 2020, two of which focus on cybersecurity awareness.

“I published my first children's book, ‘Proud in her Hijab’ in 2021. That was about empowering girls, and Muslim girls who choose to wear the hijab to be proud of who they are in their identity. But then six months later, something happened at my home. My kids are all online gamers, and they got hacked on two different scenarios. You know, out of the four kids, two of them got hacked. That really gave me the wakeup call to write my second book. What are we really doing as parents and even educators? We don't have cybersecurity education in schools. So what are we really doing besides arming kids with all the tablets and computers and gadgets and connecting them to the internet?” Kemal says.


❝

What are we really doing besides arming kids with all the tablets and computers and gadgets and connecting them to the internet?”


In her second book, ‘Oh No…Hacked Again!’, Kemal stresses the importance of both online kindness alongside more traditional lessons around multi-factor authentication and maintaining online privacy. The internet can become dangerous for children very quickly, and Kemal wanted to ensure both children and their parents felt confident to keep themselves safe. Kemal took the lessons of this book to several speaking engagements, spreading awareness around protecting children in an online world.

“The other book is called ‘See Yourself in Cybersecurity’. That one is for middle and high school students to introduce and expose cybersecurity what it is as a career,” Kemal says.

The inspiration for this book came from Kemal’s LinkedIn, where she receives numerous questions from aspiring cybersecurity professionals.

“Growing up, I've never heard any kid who says that I want to be in cybersecurity. Long term planning for shrinking that workforce gap is making sure that our kids have those options; that the kids who look like me — look like us — are represented in this in this field. I think the industry could benefit a lot from having diverse voices and perspectives when solving the sophisticated problems that we continue to face in the industry,” Kemal says.

Kemal recently received her master’s in cybersecurity from Georgia Tech University, which she attended virtually while residing in Minnesota. After learning about security towards the end of her undergraduate career, Kemal wanted to expand her cybersecurity knowledge.

“The field that we're in, it's always a continuous learning,” Kemal says.

Kemal also participates in several lecturing and education experiences. Her TEDx talks and LinkedIn learning courses provide career development assistance for other cybersecurity professionals. Kemal’s advocacy centers on closing gaps within the industry. While encouraging young people to consider cybersecurity as part of their career paths, Kemal also works with current professionals to increase diversity within the field. She uses her experiences as an immigrant, a Black woman, a mother and a professional to educate and uplift others within the industry.

KEYWORDS: cybersecurity awareness internet security online privacy security leaders Women in Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Blue digital background that says "2024 Cybersecurity Trends"

    5 Cybersecurity trends in 2024

    See More
  • Card in ATM

    Two-thirds of financial institutions faced cyberattacks in 2024

    See More
  • ransomware ecosystem

    2024 saw a 30% increase in active ransomware groups

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing