Hello, everyone... This is my first attempt in writing a personal statement.. I hope to get feedback on my writing! Thanks a lot:)
--
Digital transformation is a double-edged sword, unlocking opportunities for economic growth while exposing critical cybersecurity vulnerabilities. This has intrigued me and made me eager to understand how to efficiently address these issues in a practical manner. It also ignited my aspiration to pursue a career as a consultant specializing in cybersecurity to contribute to safeguarding Indonesia's digital future.
In 1.5 years of work as an IT consultant, I have worked on several projects focused on advising and ensuring information security within organizations. One of these projects involved a state-owned enterprise in Indonesia that had recently fallen victim to a ransomware attack. In response, the company decided it was imperative to enhance its IT governance and information security controls. I was responsible for assessing the current state of information security based on the Information Security Management System (ISMS) standard. The assessment identified gaps, and to close these gaps, I developed standard operating procedures, including those for asset management and incident management. I then communicated these procedures to stakeholders, ensuring they thoroughly understood the proposed information security controls. These documents became the foundation for the company to implement and monitor its information security controls.
Through these projects, I gained a profound understanding of the concepts of Confidentiality, Integrity, and Availability (CIA). However, given my exposure to more practical and detailed controls concerning cybersecurity, I realized I still lack certain knowledge in this area. I often engage with subject matter experts at my workplace to address this issue. I have come to understand that having a solid foundation in information technology is key to closing this knowledge gap. Therefore, I am eager to deepen my knowledge of cybersecurity.
My current role has opened my eyes to the state of cybersecurity within Vital Information Infrastructure (VII) in Indonesia. In 2022, Indonesia outlined objectives to protect the continuity of VII, prevent disruptions due to cyberattacks, enhance preparedness for dealing with cyber incidents, and accelerate recovery from the impacts of such incidents. Despite these objectives, data breaches and security incidents within VII continue to occur across the nation, causing widespread negative impacts. Understanding these issues fuels my ambition to become a consultant specializing in cybersecurity, allowing me to contribute to addressing these challenges by providing advisory and assurance for organizations' cybersecurity implementations within Indonesia's VII.
I believe that the Master of Information Technology program at the University of Glasgow is the best choice to help me further my academic and professional goals. The program's comprehensive curriculum will equip me with a strong foundation in IT, with core courses such as Programming and Software Engineering enabling me to design secure systems and plan effective security testing. Moreover, the optional courses in Enterprise Cyber Security and Cybersecurity Fundamentals will deepen my understanding of advanced security management issues, providing me with practical knowledge of identifying and addressing vulnerabilities. These courses will also enhance my ability to communicate technical concepts and security solutions to stakeholders-a critical skill for consultants. In preparation for this program, I have been taking online courses in IT fundamentals and Python programming to strengthen my technical skills.
Furthermore, the University's reputable Glasgow Cyber Defence Lab, which focuses on researching the digital resilience of Critical National Infrastructure sectors, greatly appeals to me. I hope to connect with the research unit, build my network with professors and research associates, and participate in research in this area to further understand cybersecurity issues. I have also read a journal authored by Dr. Tania Wallis, et al., on Interorganizational Cooperation in Supply Chain Cybersecurity. This work gave me insight into the implementation of the National Cybersecurity Strategy for Critical Infrastructure in the UK and the importance of effective inter-organizational cybersecurity cooperation. For my dissertation, I aspire to research cybersecurity in the government sector in the UK and share the outcomes as lessons learned for stakeholders in Indonesia.
If granted the opportunity to study at the University of Glasgow, I am committed to maximizing the experience. Beyond my coursework, I plan to participate in conferences, internships, and workshops on cybersecurity. I also plan to join the Women in STEM (WiSTEM) student club in the hope of broadening my perspective on STEM-related projects.
Upon obtaining my MSc in Information Technology at the University of Glasgow, I intend to continue working as a cybersecurity consultant, focusing on helping organizations implement robust security measures. I also aspire to collaborate with The National Cyber and Encryption Agency and The Ministry of Communications and Informatics to offer expert guidance and contribute to research or analysis concerning cybersecurity implementation in VII.
--
Digital transformation is a double-edged sword, unlocking opportunities for economic growth while exposing critical cybersecurity vulnerabilities. This has intrigued me and made me eager to understand how to efficiently address these issues in a practical manner. It also ignited my aspiration to pursue a career as a consultant specializing in cybersecurity to contribute to safeguarding Indonesia's digital future.
In 1.5 years of work as an IT consultant, I have worked on several projects focused on advising and ensuring information security within organizations. One of these projects involved a state-owned enterprise in Indonesia that had recently fallen victim to a ransomware attack. In response, the company decided it was imperative to enhance its IT governance and information security controls. I was responsible for assessing the current state of information security based on the Information Security Management System (ISMS) standard. The assessment identified gaps, and to close these gaps, I developed standard operating procedures, including those for asset management and incident management. I then communicated these procedures to stakeholders, ensuring they thoroughly understood the proposed information security controls. These documents became the foundation for the company to implement and monitor its information security controls.
Through these projects, I gained a profound understanding of the concepts of Confidentiality, Integrity, and Availability (CIA). However, given my exposure to more practical and detailed controls concerning cybersecurity, I realized I still lack certain knowledge in this area. I often engage with subject matter experts at my workplace to address this issue. I have come to understand that having a solid foundation in information technology is key to closing this knowledge gap. Therefore, I am eager to deepen my knowledge of cybersecurity.
My current role has opened my eyes to the state of cybersecurity within Vital Information Infrastructure (VII) in Indonesia. In 2022, Indonesia outlined objectives to protect the continuity of VII, prevent disruptions due to cyberattacks, enhance preparedness for dealing with cyber incidents, and accelerate recovery from the impacts of such incidents. Despite these objectives, data breaches and security incidents within VII continue to occur across the nation, causing widespread negative impacts. Understanding these issues fuels my ambition to become a consultant specializing in cybersecurity, allowing me to contribute to addressing these challenges by providing advisory and assurance for organizations' cybersecurity implementations within Indonesia's VII.
I believe that the Master of Information Technology program at the University of Glasgow is the best choice to help me further my academic and professional goals. The program's comprehensive curriculum will equip me with a strong foundation in IT, with core courses such as Programming and Software Engineering enabling me to design secure systems and plan effective security testing. Moreover, the optional courses in Enterprise Cyber Security and Cybersecurity Fundamentals will deepen my understanding of advanced security management issues, providing me with practical knowledge of identifying and addressing vulnerabilities. These courses will also enhance my ability to communicate technical concepts and security solutions to stakeholders-a critical skill for consultants. In preparation for this program, I have been taking online courses in IT fundamentals and Python programming to strengthen my technical skills.
Furthermore, the University's reputable Glasgow Cyber Defence Lab, which focuses on researching the digital resilience of Critical National Infrastructure sectors, greatly appeals to me. I hope to connect with the research unit, build my network with professors and research associates, and participate in research in this area to further understand cybersecurity issues. I have also read a journal authored by Dr. Tania Wallis, et al., on Interorganizational Cooperation in Supply Chain Cybersecurity. This work gave me insight into the implementation of the National Cybersecurity Strategy for Critical Infrastructure in the UK and the importance of effective inter-organizational cybersecurity cooperation. For my dissertation, I aspire to research cybersecurity in the government sector in the UK and share the outcomes as lessons learned for stakeholders in Indonesia.
If granted the opportunity to study at the University of Glasgow, I am committed to maximizing the experience. Beyond my coursework, I plan to participate in conferences, internships, and workshops on cybersecurity. I also plan to join the Women in STEM (WiSTEM) student club in the hope of broadening my perspective on STEM-related projects.
Upon obtaining my MSc in Information Technology at the University of Glasgow, I intend to continue working as a cybersecurity consultant, focusing on helping organizations implement robust security measures. I also aspire to collaborate with The National Cyber and Encryption Agency and The Ministry of Communications and Informatics to offer expert guidance and contribute to research or analysis concerning cybersecurity implementation in VII.