{"id":275,"date":"2026-04-29T17:41:53","date_gmt":"2026-04-29T17:41:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/?page_id=275"},"modified":"2026-05-04T16:32:26","modified_gmt":"2026-05-04T16:32:26","slug":"reflection-essay","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/reflection-essay\/","title":{"rendered":"Reflection on My Growth in Cybersecurity    and Career Readiness"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Nicholas Dorsey<\/p>\n\n\n\n<p class=\"has-text-align-center\">Old Dominion University<\/p>\n\n\n\n<p class=\"has-text-align-center\">April 26, 2026<\/p>\n\n\n\n<p>My degree program in cybersecurity at Old Dominion University not only provided me with technical knowledge, but it has also enabled me to be familiar with the way of relating technical prowess, moral judgment, interdisciplinary thinking, and professional responsibility. This reflection uses the \u201cWhat, So What, Now What\u201d model to investigate how my coursework, military experience, and portfolio artifacts equipped me to work in the field of Cybersecurity Governance, Risk, Compliance, and, later on, project management. The SCHEV Communications video supports that reflection begins with a valuable experience, continues into the world of analysis, and ends with action (SCHEV Communications, 2022). The structure is also significant to me because I do not wish to limit myself to explaining what I completed. I would like to tell you how I have changed my way of thinking and how it will affect my practice in the future. The intensity of the reflection intensifies when it goes beyond the recall, is associated with the analysis, evaluation, planning, and action (Mohamed et al., 2022). This is how my experience in this program has been. As I was perusing through my artifacts, I came to learn that cyber studies, ethics, law, psychology, and leadership interacted to shape me. I also came to realize that my best skills are not in isolation. They work together. Critical thinking helps in ethical judgment and decision making. Leadership supports accountability. Interdisciplinary thinking helps in the analysis of the risks through different lenses. The paper reflects on such associations and how they will make me qualified to work in the field of GRC and project management.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Critical Thinking and Problem Solving<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Interdisciplinary Research Paper<\/strong><\/p>\n\n\n\n<p>My interdisciplinary research paper on artificial intelligence in penetration testing is one of the clearest examples of my growth in critical thinking and problem-solving. When I began that project, I tried to treat the problem as a technical one. I was keen on what AI might be able to do, how quickly it might be able to perform, and how it might enhance efficiency. As I began to formulate the paper, I found that the actual question was more general. I was forced to study computer science, ethics, and psychology simultaneously. That process transformed my thinking in regard to cybersecurity issues. I came to know that one of the components of a decisive choice is technical competence. Much value is placed on accountability, trust, human oversight, and context. Ethical principles in making decisions related to cybersecurity include autonomy, justice, beneficence, and non-maleficence (Fenech et al., 2024). That observation made me realize why morally responsible security work can and should involve moral judgment. Another artifact that has helped me understand the role of interdisciplinary thinking in enhancing risk analysis is this one. Risk assessment in GRC will require evaluation of both technical, legal, and human risks. Efficiency versus stakeholder needs, compliance requirements, and long-term impact will be some of the areas where I will need to balance efficiency in project management. The current paper taught me how to deal with such complexity.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>National Cybersecurity Strategy Analysis<\/strong><\/p>\n\n\n\n<p>The same skill was also acquired by my analysis of the National Cybersecurity Strategy differently. This artifact challenged me to consider policy, law, institutional responsibility, and strategic coordination. Rather than addressing a very specific technical issue, I needed to look at how national policy allocates responsibility and responds to cyber threats. The task helped me to read between the lines of a document. I was required to determine priorities, assumptions, and implications. I also needed to discuss the reason why big institutions, governments, and technology providers have significant roles in cyber risk management. Interdisciplinary learning can assist students to become more receptive to various perspectives and build better connective reasoning (van Goch, 2023). I observed that in mine on this artifact. I was no longer posing the question of how threats occur. I also wondered who is in charge, the impact of policy on action, and the appearance of a coordinated response. The questions are critical in GRC since governance is based on the interpretation of policies, regulatory consciousness, and organised risk communication. They are also relevant in project management, as only when the strategic goals, accountability, and coordination are evident, big projects become successful.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Perspective Taking and Ethical Judgment<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Reflective Writing Assignment<\/strong><\/p>\n\n\n\n<p>The reflection writing exercise on cybersecurity ethics had a significant impact on my mindset regarding professional judgment. The three things that I learned in that artifact that changed my thinking were as follows: I was educated that the concepts of legality and morality do not always imply each other. I became to understand that there is loyalty to be extended to the mission and not to personalities. I also realized that whistleblowing can be viewed as ais a duty, and not a betrayal. These lessons are applicable because, in many instances, cybersecurity professionals are in a situation where they have rules that fail to answer all the questions. With the help of ethical principles, values are created to directly impact practice by making decisions based on cybersecurity (Fenech et al., 2024). This idea is connected with my own consideration. I can now see that a cybersecurity professional has to be ready to ask the question not only: is it possible, but also: should it be done, and what are the protection measures. Such thought is needed in GRC because the job demands that there should be trust, enforcement of policies, and accountability in the organization. Ethical judgment applies to project management as well since the choices made concerning the deadlines, communications, resources, and risks affect real people and real systems. This artifact helped me to understand that character is one of the aspects of competence.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Cyber Law Writing Assignment<\/strong><\/p>\n\n\n\n<p>The other aspect that my writing assignment on cyber law helped me to strengthen my opinion on perspective taking is through my new perspective. The artifact compelled me to view the speech, control, platform accountability, and constitutional issues from different perspectives. I had to consider the strength of the government, the will of the private sector, the discourse, and the rights of different groups. It was a learning experience as I learned to slow down and evaluate opposing arguments instead of rushing to a fast conclusion. The interdisciplinary students are more apt to be receptive to other viewpoints and broaden their thinking (van Goch, 2023). I am conscious of growth in this assignment. I also learnt that in order to do an effective analysis, you must be more than opinion. It involves being aware of the interests and assumptions of the different positions. It is an apt skill that directly applies to GRC, in which there are often risk decisions with legal, ethical, and organizational tensions. It is also an essential part of project management because team members and team leaders, clients, and regulating bodies may perceive the same issue in various ways. This artifact has assisted me in becoming more conscious of my communication style and being open to complexity instead of avoidance.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Case Analysis: Utilitarianism<\/strong><\/p>\n\n\n\n<p>Another step towards my moral development was the ethical development, where I examined Google Street View using my utilitarian case. In the said artifact, I had to strike a balance between the aspects of innovation and privacy, convenience and harm, and the worth of the people to the corporations and the corporate responsibility. Such an exercise made me think more specifically about stakeholders. I had to ask who the risks are, and what the design choices will add to the trust of the people. This is essential because not everything about cybersecurity is systems. It also deals with individuals, principles, and effects. I could also relate the technical design to ethical responsibility, and this made my analysis more powerful. This practice is fundamental in GRC because the security measures and policies must be helpful to protection and justice. It is also useful in project management. It can result in the failure of a project because it does not take into consideration the influence of the stakeholders and the long-term trust. This artifact enabled me to understand that practical judgment could be developed with the assistance of ethical reflection.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Leadership, Professionalism, and Teamwork<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Military Training Jacket &amp; Evaluation<\/strong><\/p>\n\n\n\n<p>My military training jacket and evaluation shows leadership and professionalism, and controlled execution. Reflectively, I may refer to it as a manifestation of habits that can be directly translated to the domains of cybersecurity, GRC, and project management. It exhibits awareness of standards, procedures, inspections, preparedness, and responsibility. It was not so with abstractions in my military service. Day in, day out, we had expectations. I was obliged to write down something in a clear way, act according to the demands, and be diligent. Cybersecurity behavior is affected by wise choices and disciplined actions (Howell et al., 2024). My experience can be connected to that discovery. Good security practice depends on care habits, routine, and consciousness. These were habits that I had acquired during my Navy life, many years before I could describe them. These types of practices simplify the compliance, maintenance of the control, and reporting of risks in GRC. They assist in the planning process, execution, communication, and quality assurance of the project. It was this artifact that made me realize that I already have the background needed for these fields in terms of organized leadership.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Black Belt Certification- Lean Six Sigma<\/strong><\/p>\n\n\n\n<p>My black belt certification in Lean Six Sigma creates a direct correlation between my military experience and process improvement and strategic leadership in a straightforward way. It is no ordinary credential. It is a professional problem-solving approach, a reduction of wastage, and the construction of systems that will be able to endure in the long run. Lean Six Sigma will concentrate on problem definition, performance measurements, root cause analysis, process improvement, and maintenance of control of the changes once made. The structure is important to me since it has to do with the type of work I would like to do in GRC, and more so in project management. It helped me to see beyond the symptoms of the problem and consider its origins that continue to exist. It also taught me that being a good leader does not necessarily mean that a problem should not be fixed once. It also takes an interest in establishing an eradication of recurring failure procedures.<\/p>\n\n\n\n<p>This certification enabled me to reinforce my knowledge of responsibility and continuous improvement. GRC organizations need to point out areas of weakness in compliance, gauge risk, enhance controls, and record improvement over time. Project management teams are expected to be in a position to identify objectives, resource management, tracking of progress, and delivery of quantifiable outcomes. Lean Six Sigma culture favors the two disciplines because it entails organization, evidence, and follow-up. The contribution of proper and responsible behavior in the cybersecurity context is associated with reflective decision-making (Howell et al., 2024). This idea applies to this artifact since Lean Six Sigma made me understand that I need to make decisions relying on a process, data, and analysis instead of guesses. It reinstated itself in the art of thinking in a disciplined manner. It is also through this certification that I was able to come up with my definition of what leadership is. My current interpretation of the term leadership is that a person is able to make systems work, lead other groups in transforming, and produce believable results. This is what my two career objectives are all about.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Portfolio Development and Future Direction<\/strong><\/p>\n\n\n\n<p>This portfolio was quite a learning experience by itself. It helped me to strategize my story, identify my strongest points, and explain how single artifacts might be relevant to a single career path. The What, So What, Now What model equipped me with an effective model of that process as it forced me to go beyond summary and get to the analysis and additional planning (SCHEV Communications, 2022). When reflection is involved, coupled with planning, action, and evaluation, reflective practice is more effective than on the recall level (Mohamed et al., 2022). This was one of the lessons in this portfolio process. It made me realize that only the reflection that results in more definite responsibility in the future could be valuable. It also caused my narrative identity to come into the limelight. I am not just a person who studied cybersecurity. The areas that I have been training to relate to include technical analysis, moral judgment, legal consciousness, responsible action, and leadership. My portfolio helped me acknowledge that my artifacts are a statement of my development since I am candidly thinking about them and connecting them to practice further. It also showed me that employers and graduate programs will be on the search to find evidence of the fact that I will be capable of transferring learning to responsible action. The fact that transparency matters because in the two fields, people require those professionals capable of balancing learning, process, ethics, communication, and accountability under such pressure, and at the same time be in a position to lead others to move in the right direction responsibly.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Going back to my degree learning outcomes, I can easily note that this interdisciplinary program shifted my thoughts and how I go about preparing to take action. It has enabled me to bridge the technical competence to the realms of ethics, law, psychology &amp; sociology, leadership, and systematic reflection. It also helped me to learn that it is not necessary to have reflections beyond professional development. It is part of it. The What, So What framework helped me to transform the description into action and analysis in the future. Reflective practice also helped me to apply past experiences to future accountability. The knowledge that it is interdisciplinary helped me become open-minded to the rest of the opinions, and at the same time, become more connected in thinking. Ethical scholarship also helped me to understand that cybersecurity options are value-based choices. Cybersecurity as a topic of study helped me understand that prudent decision-making and discipline can be employed to make safe decisions. All these lessons culminated in explaining why studying classes like IDS 300W was so important to me. Before commencing specific cybersecurity tasks, they trained me to handle complexity. They also provided me with readiness for careers in GRC and project management, which are not jobs where interdisciplinary thought, ethical judgment, and structured leadership can be optional. They are necessary. They also helped me to have a better insight into myself as I am becoming an exceptional professional.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>SCHEV Communications. (2022, August 8).&nbsp;<em>Reflection Process: What So What Now What<\/em>. YouTube.&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=4fClpsrVbdE\">https:\/\/www.youtube.com\/watch?v=4fClpsrVbdE<\/a><\/p>\n\n\n\n<p>Fenech, J., Richards, D., &amp; Formosa, P. (2024). Ethical principles shaping values-based cybersecurity decision-making.&nbsp;<em>Computers &amp; Security<\/em>,&nbsp;<em>140<\/em>, 103795\u2013103795.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.cose.2024.103795\">https:\/\/doi.org\/10.1016\/j.cose.2024.103795<\/a><\/p>\n\n\n\n<p>Howell, C., Maimon, D., Muniz, C., Kamar, E., &amp; Berenblum, T. (2024). Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions.&nbsp;<em>Frontiers in Psychology<\/em>,&nbsp;<em>15<\/em>.&nbsp;<a href=\"https:\/\/doi.org\/10.3389\/fpsyg.2024.1372681\">https:\/\/doi.org\/10.3389\/fpsyg.2024.1372681<\/a><\/p>\n\n\n\n<p>Mohamed, M., Rashid, R. A., &amp; Alqaryouti, M. H. (2022). Conceptualizing the Complexity of Reflective Practice in Education.&nbsp;<em>Frontiers in Psychology<\/em>,&nbsp;<em>13<\/em>(1), 1\u20138. Frontiers in.&nbsp;<a href=\"https:\/\/doi.org\/10.3389\/fpsyg.2022.1008234\">https:\/\/doi.org\/10.3389\/fpsyg.2022.1008234<\/a><\/p>\n\n\n\n<p>Van Goch, M. M. (2023). Interdisciplinary students\u2019 reflections on the development of their epistemic fluency.&nbsp;<em>Frontiers in Education<\/em>,&nbsp;<em>8<\/em>.&nbsp;<a href=\"https:\/\/doi.org\/10.3389\/feduc.2023.1145227\">https:\/\/doi.org\/10.3389\/feduc.2023.1145227<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/\">Jump to About Me<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/resume\/\">Jump to Resume<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/critical-thinking-problem-solving\/\">Jump to Skills<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nicholas Dorsey Old Dominion University April 26, 2026 My degree program in cybersecurity at Old Dominion University not only provided me with technical knowledge, but it has also enabled me to be familiar with the way of relating technical prowess,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/reflection-essay\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30983,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/pages\/275"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/users\/30983"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/comments?post=275"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/pages\/275\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/pages\/275\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholasdorsey\/wp-json\/wp\/v2\/media?parent=275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}