{"id":82,"date":"2025-04-29T21:06:30","date_gmt":"2025-04-29T21:06:30","guid":{"rendered":"https:\/\/student.wp.odu.edu\/qedmo001\/?page_id=82"},"modified":"2025-04-29T21:19:42","modified_gmt":"2025-04-29T21:19:42","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/qedmo001\/my-works-cyse201s\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Quinn Edmonds<br>4\/17\/25<br>CYSE 201S<br>Professor Yalpi<br>Career Paper<br>I have chosen a chief information officer as my example for the relationship of social science and cybersecurity. I chose this topic mainly because my father is a CIO at a company called M-linqs and has taught me some things now that I have started taking cybersecurity classes. From what we learned in class and from what my dad has told me at the dinner table, I believe I have a good understanding of how to apply some of the concepts we have learned in class this year. My dad has been in the field for a long time and is also the chief security officer because the jobs are tied together.<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p>I\u2019ll be using chapter 5 to better describe what a CIO does. Essentially the chief information officer is the person in charge of protecting the data and making sure everyone on the team knows what they need to know. The attributes needed for success are discussed in this module. Decision making is one of the key aspects of cybersecurity professionals, you need to know when to rely on your team and when you need to step in. My dad earned a series of certifications that he said all cybersecurity<br>professionals should have, as well he can code in a variety of languages which is not his main task, but he can help with. Teamwork is one of the biggest components of being \u201cChief\u201d in anything as well as your technical expertise, you won\u2019t be able to handle all the responsibilities of each goal reliably without a team to help you.<\/p>\n\n\n\n<p>Cybersecurity can help diversify our world, by using online centered workspaces. Using M-Linqs as an example, my father works almost entirely from home except when he needs to go get clearance from a government branch, this means people with extreme physical disabilities can be top of the line cybersecurity professionals. For a modern example, some streamers have hired wheelchair bound cybersecurity professionals to moderate their chat without knowing they were ever disabled, just based of skills alone. My dad works with a very diverse amount of people from when I\u2019ve seen video calls. The people in my class show marginalized groups are unimpeded from becoming exceptional cybersecurity professionals and society accepts them based on skills and not any other prejudice. It shows a direct connection between cybersecurity and an increase in diversity, which is wonderful news in today\u2019s age. Also, my dad\u2019s company has a deal with the military for each move from house to house in the military, my dad\u2019s cybersecurity team has defended which directly benefits society at large and can be a way to protect our people.<\/p>\n\n\n\n<p>In conclusion, a CIO can be a role anyone can achieve with the right skills and technical abilities to back them up. Ranging from government contractors and streamers, cybersecurity has a deep reach in society in everyday things, directly benefiting our people. Cybersecurity requires following a path set by top professionals in our society with certifications to conquer on the way to the top. It is a very diverse field that is approachable to anyone with a pc. CIOs require a pinnacle of all these things to achieve success.<br><br><br>Sources:<\/p>\n\n\n\n<p>West, Heather. \u201cGrowing a Diverse Workforce in Cybersecurity.\u201d Center for Cybersecurity Policy and Law, 27 July 2023, www.centerforcybersecuritypolicy.org\/insights-and-research\/growing-a- diverse-workforce-in-cybersecurity.<br>Warn, Dara. \u201cFive Essential Skills for Cisos: A Roadmap to Success in Cybersecurity Leadership.\u201d Forbes, Forbes Magazine, 16 Jan. 2025, www.forbes.com\/councils\/forbestechcouncil\/2025\/01\/16\/five-essential-skills-for-cisos-a-roadmap-to-success-in-cybersecurity-leadership\/.<br>https:\/\/www.linkedin.com\/in\/jeff-edmonds-388baa1?trk=org-employees<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quinn Edmonds4\/17\/25CYSE 201SProfessor YalpiCareer PaperI have chosen a chief information officer as my example for the relationship of social science and cybersecurity. I chose this topic mainly because my father is a CIO at a company called M-linqs and has&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/qedmo001\/my-works-cyse201s\/career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30315,"featured_media":0,"parent":69,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/pages\/82"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/users\/30315"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/pages\/82\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/pages\/82\/revisions\/91"}],"up":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/pages\/69"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/qedmo001\/wp-json\/wp\/v2\/media?parent=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}