Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Women in security: A guiding force

By Adam Brown
women in security

CREDIT: Margie Canto

July 14, 2021

How often do you consider gravity? And the power of this invisible force to move oceans, hold planets in orbit, and quite literally, keep us all grounded.

Now, how about women in technology? Another force of nature that, I think, deserves more visibility and recognition. Men haven’t cornered the market on technological genius, innovation, and invention. But too often, women have had to work all the harder not only to prove that fact, but also to be equally recognized for their extraordinary contributions.

Pioneers of the past

Lost in space? Not on Katherine Johnson’s watch.

Had it not been for Katherine Johnson, the Apollo 13 astronauts may have never returned home.

Before computers of the steel and silicon variety existed, Katherine was a flesh and blood computer. As a NASA employee, she wrote many of the foundational orbital mechanics calculations that enabled the safe return of the Apollo 13 astronauts Jim Lovell, Fred Haise, and Jack Swigert. In one of many interviews about the fateful mission, she stated, “Everybody was concerned about them getting there. We were concerned about them getting back.”

Katherine was also a black woman living in an era that put hurdle after hurdle in front of her. But obstacles be damned. As she said, “We needed to be assertive as women in those days — assertive and aggressive — and the degree to which we had to be that way depended on where you were. I had to be.”

Many have come to know Katherine Johnson’s story through the film “Hidden Figures.” In 2015, nearly 30 years after her retirement from NASA, President Barack Obama awarded her the Presidential Medal of Freedom. A year later, NASA bestowed upon her the Silver Snoopy Award in honor of her outstanding achievement in human flight safety and mission success.

Meet Grace Hopper, aka Grandma COBOL

Without Grace Hopper, modern developers and h4x0rs would not have their 1337 warez.

Grace earned her Ph.D. in Mathematics from Yale and served as a mathematics professor to other young women at her undergraduate alma mater, Vassar College. When World War II hit, she tried to join the U.S. Navy, but was denied. Undeterred, she enlisted with the Naval Reserve, where she began her programming career on the Harvard Mark I, a general-purpose electronic computer built to support calculations that would later underpin the success of the Manhattan project.

As a woman determined to make waves with her naval career — one that saw her retire as a rear admiral — Grace lived by a guiding principle, “A ship in port is safe, but that’s not what ships are built for. Sail out to see and do new things.”

She set out to design an intuitive programming language based on the English language. She oversaw the release of early compiled languages, such as FLOW-MATIC. She was a “plank owner” for the Conference/Committee on Data Systems Languages (CODASYL). She led the efforts that ultimately produced the COBOL programming language. In short, another true pioneer.

Wi-Fi? Why yes — thanks to Hedy Lamarr.

Louis B. Mayer, a partner of Metro-Goldwyn-Mayer (MGM) studios, once promoted Hedy Lamarr as the world’s most beautiful woman. But she was so much more than a pretty face.

Born in Austria-Hungary in 1914, Hedy became a rising star in Austrian, German, and Czech films. In 1937, a mere two years before the outbreak of a Second World War in Europe, she left her husband, a wealthy owner of an armaments firm that supported Nazi Germany’s war efforts, and secretly made her way to Hollywood.

Hers was an era where many stars lent their talents to support the Allied war effort through the United Service Organizations (USO) and other entertainment-aligned venues. While Hedy leveraged her “star” status to help raise funds, her deeper impact on the war effort was yet to be felt, and likely not predicted by many.

At the beginning of war, Hedy co-developed a radio guidance system for Allied torpedoes using a frequency-hopping, spread-spectrum scheme designed to defeat the attempted jamming by the Axis powers and give the Allied naval forces an advantage. Unfortunately, the U.S. Navy didn’t adopt her co-invention until 1957. Fortunately for the rest of us, it was her trailblazing approach that powered the foundational technology for Bluetooth, Wi-Fi, and GPS, untethering our machines and integrating our physical lives with the digital world.

That’s right, we owe our Internet of Things (IoT) and coffee-shop-browsing freedom to this amazing woman.

More than technology: In appreciation of today’s women in cybersecurity

Throughout my cybersecurity career, I’ve met some amazing, brilliant people who’ve taught me a ton about technology. But when it’s come to “life lessons,” women have been some of my greatest teachers. I can only wonder if Katherine, Grace, and Hedy would have offered some of the same advice.

Know your value.

On my first day of training at one new job, I asked a female colleague what agency she used to work for.

“A three-letter one,” she quipped back.

Turns out we had similar backgrounds, but she didn’t feel the need to say more. And it showed me that she was much farther along in understanding her value and worth. In past government roles, I’d often left money on the table in exchange for exciting missions. She taught me I could have “it all” in the corporate world, but it required more than hard work, it required confidence.

“If you don’t value your worth, why should anyone else?”

Stay positive.

After a brief introduction to epidemiology, another friend found her way to cyber. She said she was drawn to how experts used programming and data models to perfect the science of studying, containing, and fighting infectious disease outbreaks. Grounded in data science, this medical field is a foundational pillar of public health, shaping policy based on evidence.

She switched her major from Nursing to Mathematics for Business – Data Science and Business Analytics and today, is working for a prominent U.S. bank, developing finance statistical analysis programs in R, Python, Java. She’s also fluent in HTML and CSS.     

As with many, her path to success wasn’t an easy, straight line, but as she sees it, “No one has time for ‘woe is me.’ Never count the closed doors. Shut out the negative voices. And keep trying. Good people will see your value and the right doors will open.”

Despite obstacles, all of these women have given the world something new and important. To me, that’s heavy.

KEYWORDS: cyber security resiliency risk management Women in Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Brown is a loving husband, devoted father, and faithful U.S. Marine Corps veteran who brings 20 years of diverse security experience to his current role as a cyber intelligence analyst at Arete. Previously, he held cybersecurity advisory and leadership positions at Ernst & Young, Symantec, and Jack Henry & Associates.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC_Women-Security_1221_300x250.png

    Nominate a female security professional for Security magazine's annual Women in Security

    See More
  • SEC0721-WIS-Companion-Feat-slide1_900px

    A glimpse of women in the security sector today

    See More
  • Vertical purple, light green and dark green stripes

    There was a 12% increase in brute force cyberattack techniques in 2024

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • October 8, 2025

    How to Support the Security Guard Force in Challenging Environments

    ON DEMAND: In this webinar, Brian Howell, Vice President, Global Head of Security at ADM, shares how his organization fosters trust among their security guard force to improve security posture and the safety of sites, processes and the officers themselves.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing