Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

Powering Cybersecurity at Global Sustainable Energy Facilities

Get to know Melody Balcet, Director, Global Cybersecurity Program at The AES Corporation.

By Maria Henriquez
SEC0819-Profile2-Feat-slide1_900px

Melody Balcet, director of the Global Cybersecurity Program at AES, oversees the cybersecurity of the energy company's assets, ensuring that the right solutions are put in place.

Photo courtesy of Melody Balcet

SEC0819-Profile2-slide2_900px

Balcet looks for individuals who bring something new to the table, a skill that her team currently lacks or there is a need for, or how candidates can help accelerate progress in challenges that the team faces.

Photo courtesy of Melody Balcet

SEC0819-Profile2-Feat-slide1_900px
SEC0819-Profile2-slide2_900px
August 7, 2019

The AES Corporation owns and operates global sustainable energy and thermal and renewable facilities, expanding over four continents and 14 countries with more than 9,000 employees worldwide. As director of the Global Cybersecurity Program, Melody Balcet reports to the AES's Global Chief Information Security Officer to provide oversight of the company's global cybersecurity program.

At AES, she faces different challenges on a daily basis. She enjoys the blurred lines of reporting structure, responsibility and domain shared across her team and space. Traditionally, AES Corporation has in some ways operated much like a holding company, with responsibility shared across the globe; however, the company is undergoing some changes due to new technologies being introduced and renewable energy becoming the lowest cost energy source. As a result, Balcet's team is learning how to operate in a more centralized or federated model, especially in the IT and cybersecurity departments that have recently combined as one digital organization. Balcet is responsible for aligning the right people to ensure advantageous decisions are made to protect AES and its global operations when it comes to cybersecurity.

Balcet’s career path has taken different paths. She recalls finalizing school, with an International Studies degree and feeling uncertain of the path her degree would take her on. Working in and out of IT roles and getting her master's degree along the way finally led her to enterprise security, by joining a Network Operations Security Center (NOSC) for the Department of Veterans Affairs, which exposed her to the world of cybersecurity.

After that, she worked at IBM’s Public Sector Cybersecurity and Biometrics services area moving up the chain to serve as one of the eight leaders of the nearly 300-person organization. Balcet wore many different hats in support of various client engagements to include Chief Security Officer, Information Assurance Lead and as a Lead and Advisor on the Federal Information Security Modernization Act to the Department of Defense (DoD) CIO for Cybersecurity.

Throughout the myriad different roles she has taken on, she has performed vulnerability scanning and management to incident response to application security to managing and overseeing large security programs on behalf of the U.S. government.

 

Changes or No Changes?

As she has stepped into larger leadership roles, Balcet agrees there have been many changes in cybersecurity, but just as many have stayed the same.

She quotes maturity and understanding cybersecurity risk as a discipline area that continues to progress. “The conversation has evolved over the years; ultimately it is our job to help business leaders understand what cybersecurity risks the organization faces, which varies by organization. Not every organization goes through the same journey.”

One of the topics she discusses frequently with her peers is, while the threat continues to evolve and change, the tactics and defenses remain largely unchanged. The conversation needs to focus on, “What actions can be taken that will most effectively reduce the risk organizations face? Many professionals reinforce the need to focus on the basics and cyber hygiene. We were saying the same thing ten years ago,” she says.

She challenges herself to go deeper.  It’s not a matter of just having cybersecurity hygiene, she notes. “When you are having a discussion with decision makers who are not experts on cybersecurity, words can sometimes fall flat. The mission of the organization can be impacted. Bridging the tactical discussion with the strategic is something organizations can improve on,” she says.

One issue that also needs discussion is how to further educate the cybersecurity workforce. Balcet sees this as an inter-disciplinary field. “There is a lot of needed focus on STEM education. But there exist many domains within cybersecurity that require more than just a scientific or technical degree. Coming from a liberal arts background myself, I understand how critical it is to have analytical skills for cybersecurity roles.”

She echoes many of her colleagues that discuss workforce challenges. It needs to start at a much younger age, she states. “There is a gap in understanding the types of careers that cybersecurity can encompass, the types of skills needed and the training that would appeal to a greater audience. One of the easiest things we can help resolve as leaders and as society is to help prepare the workforce.”

 

Minding the Gap

Balcet is passionate about reversing the lack of female leaders in the cybersecurity world. She sees the gap as a great opportunity to address the cyber skills shortage. “There lies a great opportunity to address the cyber skills shortage we are facing and will face just by targeting women,” she notes.

The value placed on employees, the tone set by the leadership and culture within the organization, she says, "are critical for women to succeed in the industry. Getting women in the industry means tackling some cultural norms head on. That can be challenging for many organizations, especially when it comes to cultural and managerial change as a whole.”

She is part of many organizations that are trying to solve the gap, including ISACA and SheLeadsTech™. Recently, Balcet finished her term as President of the ISACA Greater Washington, D.C. Chapter and presently serves as its Immediate Past President.

Diversity is another way to tackle the cyber skills gap, she believes. “Whether it’s gender, training, education, ethnicity or diversity of thought…They are all critical for obtaining a more balanced perspective on our customers, clients and stakeholders as a whole.”

Personally, Balcet tries to look beyond the resume when recruiting people for her team. She strongly believes in having the appropriate core skills for the position, but she advocates for having skills outside the limits of paper. “I look for cohesion within the existing team. It is important for the team to feel comfortable with the new person entering our space and vice-versa.”

She wants individuals who bring something new to the table, a skill that her team currently lacks or there is a need for. Two other questions to take into consideration are where the candidate can help accelerate progress in challenges that the team faces.

Balcet believes in mentorship as an opportunity to give back to the industry. “I never really thought too much about being a woman in this field. I just persisted and blended in where I could, but as the years have gone by and now raising two young daughters, I have better awareness and understanding of the challenges women face in the workplace. Being in a position where I know I can influence, I feel more compelled to and feel more responsibility to consciously advocate for diversity to help both my male and female peers.”

KEYWORDS: cybersecurity public and private security security career

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0519-Cyber-Feat-slide1_900px

    Department of Energy announces $37 million for AI and ML at DOE scientific user facilities

    See More
  • green-enews

    Sustainable Security Technology: Looking Beyond Energy Efficiency to Environmental and Human Health Impacts

    See More
  • workplace-security-freepik

    Powering the office of the future with a security ecosystem

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing