IBM Security Global Forum

 View Only

The Security Community Needs You: 2 Ways to Share Your Expertise & 3 Reasons Why You Should

By Wendy Batten posted Thu February 09, 2023 03:42 PM

  
 

Dear Members,
We would like to ask for your help. We continue to grow as a vibrant community but where we saw a dip this last year was in our blogs and discussion forums from our members. We are looking for our client and partner members to pen blogs,  contribute discussion posts and answer threads more regularly. Our community thrives on the shared knowledge that is provided. Can you assist? 

2 Ways to Share Your Expertise

The written word is always a wonderful tool for reaching others. Nothing is more empowering than putting your thoughts out there for our community to leverage via a blog or discussion post.  If you need a little inspiration, here are some examples of member blogs & discussion posts.

· My Company is Migrating Data to DBaaS: Understanding Data Monitoring Options with Guardium Data Protection and Guardium Insights

·  Network Hierarchy Management 

·  ISVA HVDB enableSharingForDirectLookups

It is simple and easy to do.

Write a blog: Submit your Blogging Application* (non-ibmers must submit)

Follow these steps to create a blog: 

  1. Log in to the Community and navigate to your group.
  2. If you are not already a member of the group where you'd like to publish a blog, click the blue “Join” button.
  3. Click on the blogs tab in the selected group. On the right side of the page, select the grey "Create a New Blog Post” button.
  4. Give your blog a title and the permalink will auto generate from the title. You can edit the permalink to include your keywords.
  5. When deciding on a title for your blog, think about the question a user would type into Google to find your content. If you use those same words in your title, it can help your blog's performance in organic search.
  6. Type or paste your content into the text box.
  7. "Associate this post with a group" is automatically populated to your specific Community.
  8. ADD AN IMAGE TO YOUR BLOG
  9. Unless you want your content to only be visible to other Community members, choose "Public" in the "Who can read your blog entry?" drop-down menu. Google and other search engines will only find and index your blog if you've selected "Public."
  10. "Who can make comments on this?" is automatically populated to Community members. We recommend leaving this setting as is.
  11.  Select "Publish.

Pro Tip: Once published, select the “share” link found at the top left of your post to share your blog on LinkedIn. You must include an image to render on social media!

Create a Discussion Post: 

Follow these steps to create a discussion post: 

  1. Select your group from the drop-down menu.
  2. Fill in the Discussion subject with a title.
  3. Populate the text box.
  4. Click Post.

Sel

3 Reasons Why You Should

  • It engrains what you know. Nothing helps deepen knowledge as effectively as sharing it. By sharing your knowledge and helping others solve problems, you create awareness about your skills and know-how in certain areas. When you have that a-ah moment and discover a new piece of information, or find a more effective way of doing things, don’t keep it to yourself. Each day, you likely have something worthwhile to share that could be beneficial to your colleagues.
  • It expands what you know. Sharing your expertise means inviting a new conversation. If you keep your eyes, ears, and mind open, you may learn something in the process as well. You’re an expert, be an example that helps raise their level of expertise too.
  • It strengthens our community.  By all of us working together, we become aware of people strengths and expertise. Your presence and knowledge are valuable to our community, please share it and help continue to grow our global network of cybersecurity experts.

If you are actively sharing your expertise we thank you and if you are not we can’t wait to see you in action. Click here to get started.


#Featured-area-1
#Featured-area-1-home


#Featured-area-1
#Featured-area-1-home


#Featured-area-1
#Featured-area-1-home
#Highlights
#Highlights-home

2 comments
1492 views

Permalink

Comments

Thu February 23, 2023 10:47 AM

@Todd Arnold YES! 100% agree.

Thu February 23, 2023 10:16 AM

One thing you should definitely do is expand your scope to cover all security-related IBM products.  For example, you should definitely include the cryptographic products and features, like the hardware security modules (HSMs), the cryptographic processors integrated into Z and POWER CPUs (e.g. CPACF), and all of the related software that uses and manages those.