Skip to main content

Amanda Fennell: From Archaeology to Cybersecurity Leadership

N2K NetworksDecember 14, 20259 min182 views
14 connections·19 entities in this video→

Early Aspirations and Academic Journey

  • πŸ’‘ Amanda Fennell initially aspired to be an archaeologist, inspired by the discovery of Ramses II's tomb.
  • πŸ’° Due to financial constraints, she prioritized colleges offering the most aid, finding academic success there after being bored in high school.
  • πŸ›οΈ Her early academic path included archaeology and anthropology, but she realized the reality of fieldwork was lonely and less glamorous than expected.

Transition to Digital Forensics and Cybersecurity

  • ⚠️ A graduate course professor highlighted the scarcity of jobs in paleoanthropology, prompting a pivot.
  • πŸ’» Fennell discovered digital forensics, a nascent field, and found it utilized her skills in analyzing small pieces of information to understand events.
  • πŸš€ The digital forensics industry experienced rapid growth, leading to numerous opportunities, including work with government agencies and companies like Guidance Software and Booz Allen Hamilton.

Building Security Programs at Relativity

  • 🀝 Amanda was recruited by the founder of Relativity to build their security program from the ground up, a compelling offer to create her ideal program.
  • ⚑ She learned the importance of balancing speed with thoughtfulness, especially in a fast-paced startup environment, to avoid mistakes.
  • 🏠 The shift to remote work during the pandemic accelerated the need for remote access capabilities and strategic innovation in security.

Leadership Philosophy and Legacy

  • ✨ Fennell emphasizes the importance of enjoying one's work, continuous learning, and curiosity in career development.
  • πŸ‘‚ Her approach to difficult situations involves pausing, breathing, and listening openly to the other party's perspective before reacting defensively.
  • 🌟 She hopes to be remembered for leaving things better than she found them, believing that everyone has a cyber warrior within them capable of contributing to global security.
Knowledge graph19 entities Β· 14 connections

How they connect

An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.

Hover Β· drag to explore
19 entities
Chapters5 moments

Key Moments

Transcript36 segments

Full Transcript

Topics11 themes

What’s Discussed

CybersecurityChief Security OfficerChief Information OfficerRelativityArchaeologyDigital ForensicsCareer DevelopmentLeadershipSecurity StrategyRemote WorkCyber Warrior
Smart Objects19 Β· 14 links
ProductsΒ· 2
PersonΒ· 1
ConceptsΒ· 10
CompaniesΒ· 6