Sunday, June 1, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Security Bloggers Network » Listening Beyond Hearing: Thriving as a Disabled Professional at SECOM (Part 2)

SBN

Listening Beyond Hearing: Thriving as a Disabled Professional at SECOM (Part 2)

by Social-Engineer on April 22, 2025

At SECOM, the diversity of our team allows more realistic testing for clients. There is no single “type” of malicious actor. So, having diversity within our operations team helps us design the best possible pretexts and scenarios. This ensures that what we present is reflective of what clients see in the real world.

SECOM’s commitment to diversity and a team-oriented atmosphere makes it an ideal workplace for individuals with disabilities. To view the beginning of this exploration please visit the April Newsletter.

Listening Beyond Hearing

Techstrong Gang Youtube
AWS Hub

How I fit in to all this…

We can look at statistics all day, but anecdotal evidence has its place too.

The information security industry has great potential for accessibility. Personally, I believe my experiences with hearing loss and neurodiversity have developed skills and perspectives that make me particularly suited to social engineering.

It may seem counterintuitive that someone with a communication related disability might seek a job so highly focused on communication, but my weaknesses are also my strengths in this case!

I LOVE connecting with people

As part of a community that is frequently and significantly impacted by language deprivation, facilitating communication is something I am both fascinated by and passionate about. I LOVE connecting with people. I love to find out about them and learn what is important to them. Communication, in whatever form, is the key to those connections, and I work with a wonderful team of like-minded individuals.

I may not hear well in the traditional sense, but I’m a GREAT listener! In all my interactions I look for context, I seek possible different interpretations, I watch facial expressions and body language, and I am experienced with seeking clarification when needed. These skills are invaluable while trying to build important social connections!

Challenges

All that said, it’s not all a walk in the park, and I don’t want to falsely represent it as such. We live in a world where accessibility is not the default. As someone with hearing loss, a lot of times it feels like the heavy lifting of communication is on my shoulders.

I only receive about 70-80% of spoken language under PERFECT circumstances

I am fluent in expressing myself in spoken English, but even with residual hearing and my cochlear implant giving decent access to sound, receptively I only receive about 70-80% of spoken language under PERFECT circumstances. Guess how often those occur?

I have to work HARD to offset what I miss. Accommodation and accessibility vary a lot depending on what I am doing any given day. Background noise can be extremely problematic. Multi person conversations jump around A LOT which can be a lot like watching a disorganized ping pong match.

I rely heavily on context clues like topic and lipreading, so I need to know what the general context of a conversation is and, ideally, be able to see the speaker. Lighting is important for being able to see lips and facial expressions. Accents are hard because they distort both what words sound and look like. I won’t even begin to expand on the challenges of trying to lipread strangers beyond adding the interesting bit of trivia that only about 30-40% of spoken English can be read on the lips. These are all variables that I must account for personally, and there isn’t always a ton of work around for them.

Very few people in my general circle of communication know ASL

Yes, I’m guilty of falling back to the “smile and nod”, probably too often. There are a couple of people in my life who read me well enough to see it and have called me on it, but usually I end up getting the backhanded compliment of “oh, you’re hard of hearing? I never would have guessed”.

Because I default to oral communication for the ease of everyone else, the reciprocated communication is less accessible to me than some form of visual communication (written English or American Sign Language) would be. Out in the world, this ends up posing a lot of challenges. At work, sincere efforts are made to make sure all relevant information is available in a reasonably accessible manner. Hearing folks used to aural communication typically default to it, even when they know ASL. Very few people in my general circle of communication know ASL, but I am EXTREMELY lucky that one of my coworkers does! Who knows, maybe the rest can be incentivized to learn. Team building exercise anyone???

AI has vastly improved live captioning, it still gives some wild (though sometimes funny) interpretations

A sizable part of my job is spent making phone calls. This is not my strongest area for obvious reasons! Accessibility tools aren’t perfect. Though AI has vastly improved live captioning, it still gives some wild (though sometimes funny ) interpretations. I do sometimes find myself having to review content more than once to puzzle out what I know I missed. There are times when I need to fall back on asking a coworker to listen to something to see if they have better luck with it than I did, particularly on calls with a poor connection. It’s a little vindicating if they can’t figure it out either!!!

Overall, though, it is all 100% worth it to me to do a job that I love with a team of people that I genuinely look forward to working with every day. With a combination of tools, persistence, and patience, I get the job done.

Making a Place

To set myself up for the most chance of success, I must recognize my weaknesses to account for them. I have had to learn to self-advocate and to be persistent about it. It’s very much a work in progress, and it’s not always easy to do.

Not all reasonable accommodations are expensive, many are even free such as process changes, but they often do cost some money. It can be hard to ask someone to “spend money on you” but there are a couple of variables to keep in mind.

  • There are programs in place that make accommodation expenses tax deductible for the business.
  • EVERYONE uses tools, it’s NOT unreasonable to ask for tools if they are needed to facilitate what you need to accomplish!

Though accessibility measures are protected by law, sometimes the social ask feels like a big deal. Even before I joined the ranks of the disability community, I never liked drawing attention to myself. I have always been quiet and private, an introvert, a work in the background to support the group kind of personality. Some of the “big ones” for me are asking for adaptations that affect a group. Things like suggesting tables be set up in the round to allow for lipreading, or turning down the background music, turning captions on, or even having to ask for a repeat or context for what seems like the umpteenth time. As with anything, there are people who resent it, but most are pro-social and happy to adapt.

Good accommodations can make or break an experience, so know that you are worth the ask, and seek those legally protected rights.

Reality Check

I know that I come from a place of privilege. My hearing deteriorated post lingually, so English is my native language, I don’t have an accent beyond my regional one, and I “pass” well in most hearing environments (even if sometimes it’s a smile and nod kind of pass). While I have had issues with denials of service and challenges with ablest behaviors out in the world, I have found a soft place to land here at SECOM.

I feel extremely fortunate to work for a company that has not batted an eye at my accessibility needs. A company that values me as a whole and has a sincere desire to make access to our work environment equitable for everyone here. I know very well that is not always the case everywhere and it can be incredibly hard to get a foot in the door enough to show your abilities.

I suppose what I offer here is perspective from the far side of the wall. For those of you wondering if your access needs stand in the way of your desired career, there IS room for everyone at the table in the information security industry. There is not only room but NEED for diversity of background and thought. You know yourself better than anyone else. What can you do when the playing field is leveled through proper accommodation? What are you interested in, and what are you passionate about? Find it and fight for it. Should you desire, perhaps there is a place here in social engineering for you as well.

Written by
Faith Kent
Human Risk Analyst, Social-Engineer, LLC

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by Social-Engineer. Read the original post at: https://www.social-engineer.org/general-blog/listening-beyond-hearing-thriving-as-a-disabled-professional-at-secom-part-2/

April 22, 2025April 22, 2025 Social-Engineer General Social Engineer Blog
  • ← ConfusedComposer: A Privilege Escalation Vulnerability Impacting GCP Composer
  • Augmented, Not Replaced – Humans Outpace AI in Simbian’s SOC Hackathon Champions →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Security Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

RSA and Bitcoin at BIG Risk from Quantum Compute
Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas 
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
FTC Orders GoDaddy to Bolster its Security After Years of Attacks
Microsoft Opens Windows Update to 3rd-Party Apps
Massive Data Breach Exposes 184 Million Login Credentials
Microsoft Authenticator Phases Out Password Features and Apple Watch Support
Coinbase Hit with Lawsuit Over $400M Data Breach and Stock Loss
The Evolution of Software Development: From Machine Code to AI Orchestration
Understanding the Cookie-Bite MFA Bypass Risk

Industry Spotlight

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | 1 day ago 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | 2 days ago 0
Microsoft Opens Windows Update to 3rd-Party Apps
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Microsoft Opens Windows Update to 3rd-Party Apps

May 29, 2025 Richi Jennings | 2 days ago 0

Top Stories

SentinelOne Outage Leaves Security Teams Hanging for Six Hours
Cloud Security Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

SentinelOne Outage Leaves Security Teams Hanging for Six Hours

May 30, 2025 Jeffrey Burt | 1 day ago 0
Zscaler Moves to Acquire Red Canary MDR Service
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Zscaler Moves to Acquire Red Canary MDR Service

May 30, 2025 Michael Vizard | 1 day ago 0
FTC Orders GoDaddy to Bolster its Security After Years of Attacks
Application Security Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

FTC Orders GoDaddy to Bolster its Security After Years of Attacks

May 28, 2025 Jeffrey Burt | 3 days ago 0

Security Humor

Orange Open Sign on Window

Microsoft Opens Windows Update to 3rd-Party Apps

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×

Security in AI

Step 1 of 7

14%
How would you best describe your organization's current stage of securing the use of generative AI in your applications?(Required)
Have you implemented, or are you planning to implement, zero trust security for the AI your organization uses or develops?(Required)
What are the three biggest challenges your organization faces when integrating generative AI into applications or workflows? (Select up to three)(Required)
How does your organization secure proprietary information used in AI training, tuning, or retrieval-augmented generation (RAG)? (Select all that apply)(Required)
Which of the following kinds of tools are you currently using to secure your organization’s use of generative AI? (select all that apply)(Required)
How valuable do you think it would it be to have a solution that classifies and quantifies risks associated with generative AI tools?(Required)
What are, or do you think would be, the most important reasons for implementing generative AI security measures? (Select up to three)(Required)

×