Yolanda C. Reid is a seasoned technology executive and trailblazer, with over two decades of leadership driving innovation at the intersection of national security and emerging technologies. As a former Department of Defense civilian for over 20 years, I have been “doing cyber” before we had the term.
Passionate about leveraging new technologies to advance the future, Ms. Reid has led workforces employing radio frequency communications, high-speed fiber networks, SCADA systems, satellite technologies, cybersecurity, cloud infrastructure, and advanced software development. Her dedication to innovation continued after transitioning from federal service to become Vice President of Cyber at EverWatch, where she co-developed the offensive cyber business line. She later joined Raytheon BBN, where she led research initiatives exploring cyber operations, artificial intelligence and machine learning, information exploitation, quantum computing, and synthetic biology.
Ms. Reid also worked at IBM, applying her technical and leadership expertise to help clients modernize mission-critical systems and adopt emerging technologies. Building on her deep commitment to client-centered solutions, she founded Code: Mercedes Q, a consultancy dedicated to assisting clients by solving critical concerns with a focus on people and impact over profits.
She holds a Bachelor of Engineering in Electrical Engineering from Vanderbilt University, a Master’s in Information Technology from the University of Maryland, University College, and is currently completing her Ph.D. in Information Technology at Capella University.
Beyond her professional achievements, Ms. Reid is a dedicated advocate for broadening participation in the cyber workforce, an enthusiastic cheer mom, and a cancer survivor who inspires others by sharing her journey of perseverance and resilience through life’s toughest challenges.
Passionate about addressing the problems related to cyber security and emerging technologies such as AI and quantum. People speak about innovation but I encourage innovation from workplace entry to developing new tools, solutions, and techniques. Let's get beyond talking about problems and challenges. Let's shape the future!
People continue to ask me to speak because I like to explain things simply for they can understand. The world makes technology trends, education, and different industries sound complicated. I made a career of learning new things and pushing to innovate for a stronger future.
Working in Cybersecurity is hard and life obstacles will still come. Stay encouraged.
Iron Butterfly: Mercedes on the NSA, Cybersecurity, and Strength through Adversity
Yolanda Reid, Associate Partner, IBM, discussed the urgent need for quantum readiness, highlighting the growing security risks, the importance of proactive planning, and steps to take to ensure quantum becomes a strategic advantage.
Skip to 20:00: Yolanda Reid: Quantum is inevitable; Surprise is Not!
Are you forgetting about research? Many times, when we think cyber, we are quickly trying to develop a product or technique to fix a known problem. But, at some point, we, as a society need to start thinking proactively.
What about the problems that are on the horizon and upcoming in the next 5 years?
We will talk about the value that research has for academics, government and the commercial sector. Research does not have to be a bunch of PhDs creating things in a lab. We foster an environment to conduct research to be used to solve problems now AND in the future. It is amazing how some current problems were solved 10 years ago and just requires minor platform and technology adjustments.
The United states defined 16 sectors of the National Critical Infrastructure. This keynote addressed what are the 16 sectors, how we are apart of multiple sectors, are we safe, what is occurring and how often, and what role we can play professionally and personally, to secure our nation.
Before CMMC rolled out, there was a lot of confusion. What was CMMC? Why did we need it? I spent time talking about the cyber landscape where there is a lot of cyber activity that is unknown to the general public.
Discussion on cyber security education. We discussed certifications and degree programs. We discussed the variety of cyber roles. Cyber is beyond hacking the network and finding hackers. There are over 52 roles needed to secure our networks and so, let's explore how you can join the cybersecurity workforce.
More than 100 miles
I generally get paid for speaking but make exceptions
People continue to ask me to speak because I like to explain things simply for they can understand. The world makes technology trends, education, and different industries sound complicated. I made a career of learning new things and pushing to innovate for a stronger future.
Working in Cybersecurity is hard and life obstacles will still come. Stay encouraged.
Iron Butterfly: Mercedes on the NSA, Cybersecurity, and Strength through Adversity
Yolanda Reid, Associate Partner, IBM, discussed the urgent need for quantum readiness, highlighting the growing security risks, the importance of proactive planning, and steps to take to ensure quantum becomes a strategic advantage.
Skip to 20:00: Yolanda Reid: Quantum is inevitable; Surprise is Not!
Are you forgetting about research? Many times, when we think cyber, we are quickly trying to develop a product or technique to fix a known problem. But, at some point, we, as a society need to start thinking proactively.
What about the problems that are on the horizon and upcoming in the next 5 years?
We will talk about the value that research has for academics, government and the commercial sector. Research does not have to be a bunch of PhDs creating things in a lab. We foster an environment to conduct research to be used to solve problems now AND in the future. It is amazing how some current problems were solved 10 years ago and just requires minor platform and technology adjustments.
The United states defined 16 sectors of the National Critical Infrastructure. This keynote addressed what are the 16 sectors, how we are apart of multiple sectors, are we safe, what is occurring and how often, and what role we can play professionally and personally, to secure our nation.
Before CMMC rolled out, there was a lot of confusion. What was CMMC? Why did we need it? I spent time talking about the cyber landscape where there is a lot of cyber activity that is unknown to the general public.
Discussion on cyber security education. We discussed certifications and degree programs. We discussed the variety of cyber roles. Cyber is beyond hacking the network and finding hackers. There are over 52 roles needed to secure our networks and so, let's explore how you can join the cybersecurity workforce.