{"id":12998,"date":"2026-03-23T03:15:09","date_gmt":"2026-03-23T03:15:09","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12998"},"modified":"2026-03-23T03:15:10","modified_gmt":"2026-03-23T03:15:10","slug":"miwic26-dr-chidimma-opara-laptop-science-lecturer-at-teesside-college","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12998","title":{"rendered":"MIWIC26: Dr. Chidimma Opara, Laptop Science Lecturer at Teesside College"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400;\">Organised by <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eskenzipr.com\/\"><span style=\"font-weight: 400;\">Eskenzi PR<\/span><\/a><span style=\"font-weight: 400;\"> in media partnership with the IT Safety Guru, the <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.itsecurityguru.org\/most-inspiring-women-cyber-2024\/\"><span style=\"font-weight: 400;\">Most Inspiring Girls in Cyber Awards<\/span><\/a><span style=\"font-weight: 400;\"> intention to make clear the exceptional girls in our business. The next is a characteristic on considered one of 2026\u2019s Prime 20 girls chosen by an esteemed panel of judges. Offered in a Q&amp;A format, the nominee\u2019s solutions are written in their very own phrases.<\/span><\/p>\n<div class=\"jeg_ad jeg_ad_article jnews_content_inline_ads  \">\n<div class=\"ads-wrapper align-right \"><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/bit.ly\/jnewsio\" aria-label=\"Visit advertisement link\" target=\"_blank\" rel=\"nofollow noopener\" class=\"adlink ads_image align-right\"><br \/>\n                                    <img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/itsecguru.dessol.com\/wp-content\/uploads\/2018\/08\/ad_300x250.jpg\" alt=\"\" data-pin-no-hover=\"true\"\/><br \/>\n                                <\/a><\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">In 2026, the awards had been sponsored by BT, Bridewell, Plexal and Constancy Worldwide. Neighborhood companions included <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.wicys.org\/wicys-uk-affiliate\/\"><span style=\"font-weight: 400;\">WiCyS UK &amp; Eire Affiliate<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.witch.online\/\"><span style=\"font-weight: 400;\">Girls in Tech and Cybersecurity Hub (WiTCH<\/span><\/a><span style=\"font-weight: 400;\">) and Seidea.<\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ltharper.com\/\"><span style=\"font-weight: 400;\">.<\/span><\/a><\/p>\n<h3><b>What does your job function entail?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">My function as a lecturer in Laptop Science at Teesside is splendidly assorted, and that selection is among the issues I take pleasure in most about it. No two days look the identical, and I get to contribute to the college in a number of alternative ways.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Educating is essentially the most seen a part of my work, and it\u2019s an element I genuinely love. I at the moment educate throughout 5 modules, from basis 12 months by to grasp\u2019s stage. I lead two of those: a closing 12 months module on Service Administration and Info Governance, and an MSc module on IT Ethics and Regulation. Main and educating these modules means designing studying supplies, getting ready and delivering classes, creating and marking assessments, and supporting college students as they develop their expertise and confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Analysis is one other core a part of my function, particularly in cybersecurity and utilized AI. This entails figuring out attention-grabbing questions, exploring them by investigation, and sharing the findings by publications. Alongside this, I&#8217;m concerned in actions that assist the broader analysis group, together with reviewing papers, making use of for grants, presenting at conferences, and contributing to the event of others\u2019 work.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There&#8217;s additionally a big aspect of educational management and administration. I handle my very own analysis tasks and budgets, supervise MSc scholar theses and PhD college students, and supply pastoral assist to each undergraduate and postgraduate college students. These obligations enable me to mentor rising researchers and assist college students navigate their educational journeys.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Past educating and analysis, I contribute to the broader lifetime of the college. I participate in outreach and advertising and marketing actions similar to open days and discovery days, and I serve on university-level committees, together with the ECR Analysis Discussion board and the Athena Swan staff.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">General, my function brings collectively educating, analysis, management, and group engagement.<\/span><\/p>\n<h3><b>How did you get into the cybersecurity business?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I usually say I dabbled my means into cybersecurity, and I believe that\u2019s a well-known story for a lot of girls who grew up and studied in Nigeria within the early 2000s. After my GCSEs, it was apparent my strengths lay in arithmetic, physics, and chemistry, so engineering appeared just like the pure path. My older sibling was already learning drugs, however that was by no means going to be my route; you actually don\u2019t need to see me making an attempt to decorate even a small scratch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All the pieces modified when my dad, who I genuinely consider was forward of his time, introduced dwelling a pc with an enormous monitor. I used to be immediately captivated. I didn\u2019t but know what a profession in computing may appear like, however I knew it sparked one thing in me.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I went on to review Arithmetic and Laptop Science, and though cybersecurity wasn\u2019t a significant a part of the curriculum, the curiosity was nonetheless there. I saved questioning what it meant to safe computer systems and what alternatives may exist in that house. That curiosity ultimately led me to pursue a grasp\u2019s diploma in Community and Info Safety at Kingston College.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That diploma opened the door to the cybersecurity world for me. I later accomplished a PhD in Laptop Science, the place I constructed and utilized machine studying algorithms to detect phishing assaults. And that\u2019s how I discovered myself absolutely immersed within the cybersecurity business.<\/span><\/p>\n<h3><b>What is among the largest challenges you might have confronted as a girl within the tech\/cyber business and the way did you overcome it?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of many largest challenges I confronted early in my profession was the dearth of visibility and steering. I didn\u2019t have many ladies, not to mention girls who regarded like me, who had been forward of me in cybersecurity. With out that illustration, I discovered largely by trial and error, and I&#8217;m positive I missed alternatives I didn\u2019t even know existed. For instance, I began my MSc satisfied that \u201ccommunity safety\u201d was the trail, solely to grasp later that my strengths and pursuits aligned much more with information safety. With a mentor, I might have made these selections earlier and extra strategically.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One other ongoing problem has been balancing household life with the calls for of staying seen and aggressive in tech. I&#8217;m a mum of three, and on the identical time, I&#8217;m anticipated to publish, lead tasks, and say sure to alternatives that preserve me progressing. Imposter syndrome nonetheless exhibits up sometimes, particularly in areas that stay closely male-dominated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What has helped me overcome these challenges is a mixture of assist and intentionality. I&#8217;m lucky to have a deeply supportive companion, and Teesside College\u2019s versatile working tradition, wellbeing assist, and dedication to gender equality have made it potential for me to develop with out burning out. Over time, I&#8217;ve additionally discovered to anchor myself in outcomes, particularly specializing in delivering robust outputs with confidence.<\/span><\/p>\n<h3><b>What are you doing to assist different girls, and\/or to extend variety, within the tech\/cyber business?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A giant a part of my work is ensuring the following era of cybersecurity professionals, particularly girls and other people from underrepresented backgrounds, can see themselves on this discipline and really feel supported as they develop. I mentor by Kingston College\u2019s Past Obstacles programme, working one-to-one with college students from underrepresented backgrounds to assist them construct confidence, recognise their strengths, perceive their talent gaps, and plan their educational and profession journeys. Many merely want somebody who believes in them and will help them navigate a system not initially designed with them in thoughts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I additionally created CipherSeen, a self-nominated, searchable listing designed to extend visibility and fairness in cybersecurity. It highlights professionals from underrepresented teams to allow them to be simply discovered for recruitment, talking engagements, panels, collaborations, and recognition alternatives.\u00a0<\/span><\/p>\n<h3><b>Who has impressed you in your life\/profession?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I&#8217;ve been impressed by many individuals all through my life and profession, however the very first supply of inspiration was myself. I grew up decided to create a special mindset and trajectory from what I noticed round me, and I wished my youthful siblings, nieces, and cousins to see that fields like computing and cybersecurity had been completely open to them, too.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alongside the way in which, I&#8217;ve been formed by so many others, particularly girls in STEM, even outdoors my discipline. Seeing girls excel in areas like physics, biology and arithmetic confirmed me what was potential lengthy earlier than I had the language or confidence to assert it for myself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">My mother and father have additionally been highly effective influences. My mum went to school with a number of kids in tow and nonetheless excelled, exhibiting me what resilience and ambition appear like in actual life. My dad, sensible and forward of his time, pursued larger schooling in Nigeria when it was far much less frequent, and he by no means stopped pushing us to consider in our personal potential.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And immediately, I&#8217;m deeply impressed by my husband, Kennedy. He skilled as a civil engineer however had the braveness to pivot into a brand new business-focused profession whereas learning for an MBA. His willingness to reinvent himself jogs my memory that development is all the time potential.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All these folks, and the teachings they mannequin, proceed to form how I present up in my work and in my life.<\/span><\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Organised by Eskenzi PR in media partnership with the IT Safety Guru, the Most Inspiring Girls in Cyber Awards intention to make clear the exceptional girls in our business. The next is a characteristic on considered one of 2026\u2019s Prime 20 girls chosen by an esteemed panel of judges. Offered in a Q&amp;A format, the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13000,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[8339,2947,8341,8303,8340,1483,8342,1840],"class_list":["post-12998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-chidimma","tag-computer","tag-lecturer","tag-miwic26","tag-opara","tag-science","tag-teesside","tag-university"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12998"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12998\/revisions"}],"predecessor-version":[{"id":12999,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12998\/revisions\/12999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13000"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-07 09:04:17 UTC -->