{"id":13373,"date":"2026-04-03T04:41:56","date_gmt":"2026-04-03T04:41:56","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13373"},"modified":"2026-04-03T04:41:57","modified_gmt":"2026-04-03T04:41:57","slug":"miwic26-nkiruka-pleasure-aimienoho-chief-info-safety-officer-normal-chartered-financial-institution-ng","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13373","title":{"rendered":"MIWIC26: Nkiruka Pleasure Aimienoho, Chief Info Safety Officer, Normal Chartered Financial institution NG"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Organised by\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eskenzipr.com\/\">Eskenzi PR<\/a>\u00a0in media partnership with the IT Safety Guru, the\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.itsecurityguru.org\/most-inspiring-women-cyber-2024\/\">Most Inspiring Girls in Cyber Awards<\/a> purpose to make clear the exceptional ladies in our business. The next is a function on one among 2026\u2019s High 20 ladies chosen by an esteemed panel of judges. Offered in a Q&amp;A format, the nominee\u2019s solutions are written in their very own phrases.<\/p>\n<div class=\"jeg_ad jeg_ad_article jnews_content_inline_ads  \">\n<div class=\"ads-wrapper align-right \"><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/bit.ly\/jnewsio\" aria-label=\"Visit advertisement link\" target=\"_blank\" rel=\"nofollow noopener\" class=\"adlink ads_image align-right\"><br \/>\n                                    <img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/itsecguru.dessol.com\/wp-content\/uploads\/2018\/08\/ad_300x250.jpg\" alt=\"\" data-pin-no-hover=\"true\"\/><br \/>\n                                <\/a><\/div>\n<\/div>\n<p>In 2026, the awards have been sponsored by BT, Bridewell, Plexal and Constancy Worldwide. Neighborhood companions included\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.wicys.org\/wicys-uk-affiliate\/\">WiCyS UK &amp; Eire Affiliate<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.witch.online\/\">Girls in Tech and Cybersecurity Hub (WiTCH<\/a>) and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/seidea.org\/\">Seidea<\/a>.<\/p>\n<h3><b>What does your job position entail?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As Chief Info Safety Officer, I&#8217;m accountable for defending the organisation\u2019s digital property whereas enabling the enterprise to innovate safely and confidently.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I lead the implementation and embedding of enterprise cybersecurity and knowledge safety danger frameworks throughout a number of markets, making certain consistency in how dangers are recognized, assessed, and mitigated. This consists of overseeing incident response, regulatory compliance, expertise danger, and third-party danger, whereas sustaining an end-to-end view of the organisation\u2019s cyber danger posture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A core a part of my position includes driving the adoption of structured danger frameworks, working carefully with expertise, enterprise, and regional groups to evaluate essential info property, outline danger profiles, and implement management enhancements that scale back publicity whereas minimising enterprise disruption.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I additionally present advisory to govt management and boards, translating advanced cyber and expertise dangers into clear enterprise insights that inform strategic selections, regulatory alignment, and danger urge for food.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">My position requires robust stakeholder engagement throughout C-level executives, regulators, and regional groups, making certain alignment, accountability, and efficient governance by danger committees and reporting boards. I additionally monitor key danger and management indicators, observe remediation efforts, and guarantee rising dangers are proactively addressed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Past danger administration, I facilitate cyber disaster administration and resilience efforts together with cyber drills, Cyber response playbooks, and restoration capabilities to make sure the organisation is ready to reply successfully to incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Equally vital is constructing a robust safety tradition. I drive consciousness and engagement throughout the organisation to make sure cybersecurity is embedded into on a regular basis decision-making.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over the course of my profession, I&#8217;ve helped strengthen cybersecurity and resilience for organisations throughout banking, telecommunications, power, and expertise sectors in a number of African markets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity right now is now not purely a technical self-discipline. It&#8217;s a management duty and a belief crucial.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At its core, my position is about safeguarding belief within the digital financial system.<\/span><\/p>\n<h3><b>How did you get into the cybersecurity business?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Like many individuals in cybersecurity, I didn\u2019t got down to construct a profession on this subject \u2014 I grew into it as expertise and danger turned unattainable to disregard.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nonetheless, my curiosity in expertise began early. I studied Electrical and Electronics Engineering, specialising in communication techniques, which gave me a robust technical basis. My first position was with MTN, one among Africa\u2019s main telecommunications firms, the place I labored as an Info Methods Service Desk Engineer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In that position, I had the chance to interact with totally different elements of the organisation and gained a broad understanding of how expertise helps enterprise operations. It was throughout this time that I turned significantly fascinated by the dynamics of the data safety house \u2014 how techniques could possibly be protected, how dangers emerged, and the way rapidly threats may evolve.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A pivotal second in my journey got here once I had a candid dialog with an skilled chief \u2014 the Common Supervisor of the Info Methods Group. I shared my profession aspirations and my want to work on massive, impactful info safety initiatives that supplied selection, complexity, and strategic depth past routine operational roles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He listened rigorously and gave me recommendation that modified the trajectory of my profession. He prompt I take into account becoming a member of a specialised cybersecurity and IT GRC agency, the place I may achieve broader publicity and speed up my progress within the subject.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I took that recommendation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That call marked the start of my journey into cybersecurity advisory \u2014 a path that has since developed into main cybersecurity and resilience initiatives throughout a number of sectors and markets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over the previous 16 years, I&#8217;ve had the chance to work with monetary establishments, telecommunications firms, expertise companies, and public sector organisations throughout Africa, serving to them strengthen cybersecurity frameworks, assist regulatory compliance, and put together for rising threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What continues to make cybersecurity significant to me is its affect. Cybersecurity protects organisations, economies, and people. And stays one of the essential disciplines in our more and more digital world.<\/span><\/p>\n<h3><b>What is among the greatest challenges you&#8217;ve confronted as a lady within the tech\/cyber business and the way did you overcome it?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the important challenges I&#8217;ve confronted as a lady in cybersecurity is navigating visibility, illustration, and the strain to persistently show credibility in environments the place ladies are sometimes underrepresented.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After I started my profession, there have been comparatively few ladies in senior cybersecurity management roles, significantly in technical and risk-focused positions. This usually meant being the one girl within the room throughout essential discussions, the place assumptions about functionality may floor earlier than I had the chance to contribute.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alongside the best way, I encountered moments of bias generally refined, generally direct:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIt&#8217;s laborious to imagine the venture chief was feminine.\u201d \u2014 mentioned after efficiently delivering an enterprise-wide info safety venture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cYou aren&#8217;t technical.\u201d \u2014 mentioned earlier than I had the chance to totally have interaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2014 amongst others.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In every of those moments, I selected to reply not with resistance, however with excellence. By persistently delivering outcomes, demonstrating experience, and displaying up with confidence, these perceptions have been steadily changed with respect.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Past illustration, one other defining problem got here at a extra private stage. At one level in my profession, I used to be near stepping away as a result of balancing the calls for of labor and the house entrance felt overwhelming. What helped me navigate that season was studying from others: mentors, friends, and skilled ladies who had walked comparable paths. Their steerage empowered me to take management, redefine stability, and transfer ahead with readability and confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That lesson has stayed with me. As John Maxwell places it, whereas a clever individual learns from their errors, the wisest be taught from the successes of others. I&#8217;ve utilized this persistently, studying from mentors, shared experiences, and the broader cybersecurity neighborhood.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a budding info safety marketing consultant, I used to be significantly influenced by Adedoyin Odunfa, a revered cybersecurity chief whose management, kindness, and dedication to growing others left an enduring impression on me. I additionally drew sensible insights from sources resembling The Strain Cooker by Nkiru Olumide Ojo, which I nonetheless discuss with.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One other defining second for me prior to now was listening to a fellow senior feminine cybersecurity chief brazenly share her expertise of stepping away briefly to regain composure earlier than going through high-pressure shopper conditions. That honesty was highly effective. It strengthened that energy and vulnerability can coexist.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I&#8217;ve confronted comparable moments \u2014 delivering advanced cybersecurity and privateness initiatives, presenting at board-level engagements, and facilitating govt coaching classes, even during times of intense strain or fatigue. These experiences strengthened my resilience and strengthened my perception that competence, consistency, and steady progress finally converse for themselves.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Equally vital has been persistently investing in myself, talking up, and constructing the suitable assist techniques. I realized that visibility issues: a closed mouth can imply missed alternatives. Networking, mentorship, and neighborhood have all performed a essential position in my progress.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Right this moment, whereas illustration in cybersecurity continues to enhance, there may be nonetheless extra work to be accomplished. Creating pathways, rising visibility, and offering sustained assist for girls in cybersecurity stay essential priorities for the business.<\/span><\/p>\n<h3><b>What are you doing to assist different ladies, and\/or to extend range, within the tech\/cyber business?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Supporting ladies in cybersecurity has change into an integral a part of my skilled journey and management philosophy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I strongly imagine that each girl\u2019s journey begins someplace, usually lengthy earlier than the affect is seen. That perception has formed how I method mentorship and management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over time, I&#8217;ve mentored a number of ladies getting into or rising throughout the cybersecurity career. Many started merely curious and wanting to be taught, in some instances, we have been studying collectively. Right this moment, they&#8217;re contributing to cybersecurity initiatives throughout totally different elements of the world. Generally I pause in awe of what these small seeds of mentoring have grown into.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I additionally based InfoSec Amazons, a mentoring initiative targeted on serving to ladies construct confidence and develop cybersecurity, resilience, and management capabilities, whereas navigating profession alternatives in cybersecurity and associated fields. The purpose is to create a supportive ecosystem the place ladies usually are not solely geared up to enter the sphere, however to thrive and lead inside it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Past direct mentorship, I&#8217;ve contributed to broader business efforts to advance range and inclusion. I&#8217;ve supported and collaborated with initiatives throughout platforms resembling ISACA London (She Leads Tech), ISC2 Nigeria, Cybersafe Basis (CyberGirls), SheSecures, NaijaSecCon, and the United Nations ITU mentorship programme, contributing by steerage, talking engagements, consciousness initiatives, {and professional} growth alternatives for girls and younger professionals at totally different phases of their careers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By mentoring, advocacy, and business engagement, I stay dedicated to creating pathways for extra ladies to take part, develop, and lead in cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I strongly imagine that range strengthens cybersecurity. Totally different views improve problem-solving, danger evaluation, and innovation \u2014 all of that are important in a subject that should continuously anticipate evolving threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Constructing a extra inclusive cybersecurity workforce just isn&#8217;t solely the suitable factor to do. It&#8217;s important for strengthening the resilience of our digital ecosystems.<\/span><\/p>\n<h3><b>Who has impressed you in your life\/profession?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I&#8217;ve been lucky to attract inspiration from many phenomenal position fashions throughout totally different aspects of my life and profession \u2014 each women and men \u2014 making it troublesome to call all of them. Nonetheless, I can spotlight just a few distinctive leaders in cybersecurity, expertise, and enterprise who&#8217;ve influenced my journey, together with Tope Aladenusi, Ade Akomolafe, Opeyemi Onifade, Dr. Ngozi Okonjo-Iweala, Adedoyin Odunfa, Dr. Alissa Abdullah, Dr. Peter Obadare, Wunmi Adetokunbo-Ajayi, Ibukun Awosika, Dr. Nneka Abulokwe, and Mikko Hypp\u00f6nen. Every has formed my considering in numerous methods \u2014 by management, excellence, braveness, and affect.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Isaac Newton\u2019s well-known reflection in his 1675 letter to Robert Hooke \u2014 \u201cIf I&#8217;ve seen additional, it&#8217;s by standing on the shoulders of giants\u201d \u2014 resonates deeply with me and displays how I method progress and management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Earlier than formally transitioning into cybersecurity, I sought steerage from an skilled skilled about my profession aspirations. I listened, acted on that recommendation, and it modified the trajectory of my profession. That have strengthened the significance of studying from those that have gone forward.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At one other section in my journey, I confronted a special sort of problem \u2014 balancing the calls for of labor and residential. There was a degree the place I thought-about stepping again. What helped me navigate that season was the counsel of skilled ladies who had walked comparable paths. Their steerage empowered me to take management, redefine stability, and transfer ahead with readability and confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a budding info safety marketing consultant, I used to be significantly influenced by Adedoyin Odunfa, a revered cybersecurity chief whose management, kindness, and dedication to growing others left an enduring impression on me.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I&#8217;ve additionally drawn insights from books and thought management targeted on supporting ladies in demanding careers. One which stood out to me is The Strain Cooker by Nkiru Olumide Ojo, which I discovered each sensible and deeply relatable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As an African Yoruba proverb reminds us:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201c\u1eb8ni t\u00ed \u00f3 b\u00e1 \u1e63ub\u00fa, \u00e1 m\u1ecd ibi t\u00ed k\u00f2 y\u1eb9 k\u00ed a t\u00fan r\u00ecn.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe one who falls is aware of the trail others ought to keep away from.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In some ways, my journey has been formed by studying from others \u2014 their errors, successes, experiences, and steerage \u2014 and I stay dedicated to doing the identical for the subsequent era.<\/span><\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Organised by\u00a0Eskenzi PR\u00a0in media partnership with the IT Safety Guru, the\u00a0Most Inspiring Girls in Cyber Awards purpose to make clear the exceptional ladies in our business. The next is a function on one among 2026\u2019s High 20 ladies chosen by an esteemed panel of judges. Offered in a Q&amp;A format, the nominee\u2019s solutions are written [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13375,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[8494,5798,8496,2016,829,619,8303,8493,8495,211,3944],"class_list":["post-13373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-aimienoho","tag-bank","tag-chartered","tag-chief","tag-information","tag-joy","tag-miwic26","tag-nkiruka","tag-officer","tag-security","tag-standard"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13373"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13373\/revisions"}],"predecessor-version":[{"id":13374,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13373\/revisions\/13374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13375"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-04 03:14:11 UTC -->