Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingTop Cybersecurity Leaders

Special Report

Inspiring the next generation of cyber leaders

Meg West, X-Force Cyber Incident Response Team Consultant, IBM

By Maggie Shein
West
March 1, 2022

Meg West shies away from the label “influencer,” but the truth is, she is one.

About a year and a half ago, she started a YouTube channel called Cybersecurity Meg and posted a video in which she shared her best tips and preparation advice for the Certified Information Systems Security Professional (CISSP) certification process. The video received roughly 10,000 views and, over the past year, Cybersecurity Meg has posted many more videos, amassing more than 200,000 views on her YouTube platform alone with no-nonsense advice and resources on getting into the field of cybersecurity.

“When I was studying for my CISSP exam in 2020, everywhere I turned to get info, I didn’t see anyone who looked like me,” West recalls. “I wanted to see this information from a diverse set of people. So I took it upon myself, and I randomly recorded a video. I was 24 at the time, and I received great feedback from so many people. From there, it has become one of my missions to proliferate free cybersecurity information to people that may not have access to it or may not be a person that fits the current mold of cybersecurity so they can say, ‘If she can do it, so can I.’”

Everything about West is inspirational. While pursuing her Master’s degree in cybersecurity, West was working on the cloud migration team for supply chain management company Tech Data — now Fortune 100 company TD Synnex. She saw an entry-level cybersecurity position open and, without any certifications or direct work experience at the time, she applied.

“It was me wanting to challenge myself. Despite no experience, they took a chance on me, which I think is really important today. I was able to efficiently communicate why I wanted to work in cybersecurity to get that initial position. The team and CISO there became some of my biggest supporters,” she recalls.

After her first few years in an entry-level cybersecurity role, West took on the role of Global Cybersecurity Incident Response Manager at Tech Data. “I’ve always been interested in technology, and for me, I was looking for a career where I could challenge myself and also feel valued and safe for a long time. Cybersecurity felt like a valuable space where I could bring my skillset and creativity and watch it change over the next couple of decades,” she says.

West eventually moved on to IBM in her current role as an X-Force Cyber Incident Response Team Consultant. “I help companies prepare for cybersecurity incidents, and I also help them respond if one occurs. I love that my job has an impact, and I love the fast-paced nature of incident response. It requires a high level of attention to detail, ability to change quickly, and ultimately helps others in what could be the worse days for any organization,” West says.

She may not have decades of cybersecurity experience yet, but West is an innovative, forward-thinking thought leader that has already made an impact on spotlighting security and narrowing the enormous skills gap the industry faces.

In addition to YouTube, West spreads her Cybersecurity Meg brand on Twitter, Instagram, LinkedIn and streaming platform Twitch. One video she posted, called “How I Would Get My First Cybersecurity Job With Zero Experience,” has already received more than 28,000 views.

Since joining IBM, West has earned her Certified Cloud Security Professional (CCSP) certification and has become a sought-after speaker for conferences and media. She is dedicated to inspiring the next generation of cybersecurity professionals, especially women, and showing them that it’s possible to succeed in a field that has been traditionally intimidating to many.

“Cybersecurity lags in hiring for diversity,” she shares. “When I first started in this field, I was on a team of all men, all of whom were older than me. A problem we face as an industry that I’d like to change is that if someone wanting to come into cybersecurity doesn’t see anyone who looks like them or has a similar background, they may feel discouraged. One mold of people leads to a lack of creativity and doesn’t promote a well-rounded environment. We need to work on that because diversity brings more ideas, more creativity and helps encourage others.”

Speaking about the industry’s current cybersecurity skills gap, West says that it’s a shared problem that requires a multi-faceted response. “Often, when we talk about the skills gap, we place the onus on the people trying to get into the field, and that’s not accurate. First of all, organizations need to be much more realistic about what they are looking for and what cybersecurity jobs entail. There is this disconnect I see sometimes between HR, hiring managers and others at organizations. If you have an entry-level position open and you are asking for five years of experience and a CISSP certification, that will make people turn away. There needs to be a better understanding of what’s really needed and what is practical and truly reevaluate what ‘entry-level’ means,” she says.

Rather than focusing only on technical skills or direct job experience, West says that to encourage more diversity and inspire more people to enter the industry, organizations and business leaders should place more emphasis on the soft skills needed to succeed in cybersecurity, such as a strong work ethic, a passion for helping others, ability to work under pressure and an ability to adjust to a changing environment.

For her part, while focusing on her career and using her social media presence to mentor and help others, West would love to one day open a nonprofit geared toward educating young women and minorities on STEM topics and preparing them for entry-level cybersecurity positions. She says she has been lucky enough to have been surrounded by great people and leaders that have encouraged her along the way, and she’d like to pass that along.

“One of my mentors taught me that the worst thing you can do is say, ‘We’ve always done it that way.’ It’s important to be the voice of change, talk about different approaches and encourage others to make an impact too,” says West.


KEYWORDS: business continuity Chief Information Security Officer (CISO) cyber security diversity in security risk management security operations Women in Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0521-Multicare_Feat-slide1_900px

    Case Study: MultiCare Health System takes security to the next level

    See More
  • Novak cyber leaders

    Making the future safer

    See More
  • Ground Zero 9/11 terrorist attacks 20th anniversary

    The 20th anniversary of September 11: Reflections on the evolution of enterprise security

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing