Keep the conversation going
We know you want to keep the conversation going so we have created a page to help you do that.
The page will be updated with slides and videos when they are available.
We hope that The Castle Conference inspired you, got you thinking and talking about the topic of Digital Wellbeing. We really hope you have been talking about the conference to your friends, family and colleagues.
We certainly are and we arranged it!
This is only the slides - no audio. Videos are below.
That’s not just a catchy slogan. It’s a mission. It’s about protecting the people we love from online scams and cyber threats that target the most vulnerable. For Scam Me, we sat down with Jemma, the founder of Culture Gem - our series sponsor and a true cyber storyteller - to talk about how cybersecurity and neurodiversity collide.
This blog unpacks the epic conversation: from teaching life skills to hacking ethics, from WannaCry to nanfluencers, from OSINT to DMARC. Buckle up - this one’s a ride.
What is Culture Gem?
Culture Gem is a unique, inclusive training platform that reimagines mandatory workplace training. It was designed by neurodivergent creators for everyone, especially those who struggle with rigid, one-size-fits-all learning. Instead of boring videos and long-winded text dumps, Culture Gem offers:
Podcasts and video games
News briefings
Colour customisation (11 choices!)
Multiple voice options
A chance to learn how your brain learns best
As Jemma puts it: “We built something that let you tailor the world around you, not just adjust yourself to fit into it.”
Cybersecurity and the WannaCry Wake-Up Call
Jemma never set out to be a cybersecurity expert. She began in teaching, then moved into direct marketing, yes, the kind of marketing where you show someone shoes and they buy the shoes.
Then came a defining moment in 2017: the WannaCry ransomware attack.
While running an event for 200 cybersecurity professionals, Jemma watched the chaos unfold as WannaCry, a massive ransomware attack, crippled computers globally, including the NHS. She saw first-hand the panic, the urgency, and the real-world consequences of poor cybersecurity practices.
“That was the moment,” Jemma said. “I realised this wasn’t just someone else’s job. I had to do something.”
And she did. That moment catapulted her from marketing into the mission-driven world of cyber safety.
Why ‘Do It for the Nans?’
Jemma’s nan is her inspiration, and her reality check. She’s not tech-savvy. She uses a corded phone with Jemma’s face on it as a call button. But scammers still target her constantly.
From fake Amazon calls to social engineering tactics, Jemma’s nan has become a mini-cyber warrior. She calls Jemma with questions like, “Should I care about this?” and then passes the advice down to her friends at the hairdresser.
“She’s a real-life influencer - a nanfluencer,” Jemma laughs.
By protecting her nan, Jemma is protecting everyone’s nan, and everyone else in the family tree. It's a ripple effect: teach one, and they teach ten more.
So, What Is Social Engineering?
Social engineering is when someone manipulates you into giving up personal or valuable information. It could be:
A phone scam pretending to be from your bank
A pop-up survey asking your pet’s name, birth date, or first car
Someone knocking on your door offering to ‘fix’ a wall, only to take your money and run
Cybercriminals often use what’s called FUD: Fear, Uncertainty, and Doubt. They scare people into making hasty decisions instead of teaching them how to respond.
According to Jemma, cybersecurity should be about reducing fear and increasing confidence. We don’t need to terrify people, we need to inform them.
What’s OSINT and Why Does It Matter?
Cam from the Inclusive Change team accidentally flexed some cyber muscles when he admitted to ‘stalking’ Jemma online for research. That’s when Jemma introduced a cyber term: OSINT, or Open Source Intelligence.
OSINT is when you gather information from publicly available sources, like someone’s LinkedIn, Instagram, or Facebook, to learn more about them.
“It’s not stalking. It’s research,” Jemma clarified with a grin.
DMARC, Email Spoofing, and the Spam Trap
Have you ever sent a legit marketing email only to find it landed in someone’s spam folder? That’s where DMARC comes in.
DMARC (Domain-based Message Authentication, Reporting & Conformance) is a way to verify that an email really comes from you and not a scammer pretending to be you. Without DMARC set up, email systems get confused and mark even safe emails as suspicious.
Jemma breaks it down like this:
“When you send a marketing email through Mailchimp or HubSpot, your email system thinks someone is impersonating you. DMARC proves it's really you sending that email.”
It sounds technical, and it is, but tools like ChatGPT can help small businesses configure DMARC, SPF, and DKIM settings step-by-step. You don’t need to be a tech wizard. You just need to ask the right questions.
Security Is a Culture, Not a Checklist
Firewalls and code only go so far. Most cyberattacks - a whopping 96% - start with human behaviour.
Someone clicks a dodgy link. Someone holds the door open for a stranger. Someone uses ‘password123’.
This is why Jemma says security is a culture, not just a checklist of tasks. You need to build a mindset, not just install software.
And that culture includes understanding insider threats, not just the malicious ones, but the ‘survivalists’ who sell data out of desperation to pay a bill. If we only look for bad people, we miss the vulnerable ones.
Why Neurodivergent Minds Shine in Cybersecurity
Here’s where it gets exciting. Cybersecurity needs neurodivergent thinkers.
Jemma explains that many cyber professionals, and even hackers, are neurodivergent.
Traits like:
Hyperfocus
Pattern recognition
Intense curiosity
Creative problem solving
These are superpowers in this field.
She shared stories of people who ‘see’ music and become world-class DJs, or who find vulnerabilities because they approach problems sideways. In a world where cyberattacks are constantly evolving, these minds are critical.
How to Get Started in Cyber (Without Being Techie)
So you don’t have a tech background? Great. Neither did Jemma.
Here’s how anyone, especially young people or neurodivergent folks, can start a cyber career:
1. Follow Your Passion
Jemma didn’t start with tech. She started with care. She wanted to protect her nan. Find your ‘why’ - that’s your fuel.
2. Learn the Basics
Platforms like Udemy offer beginner-friendly cyber courses for as little as £14. You don’t need to know everything, just enough to know what excites you.
3. Network, Your Way
LinkedIn is powerful, but there are other spaces too:
Instagram cyber influencers
Discord servers
Cyber book clubs
Local and online meetups
And if someone sends you a job listing, that’s a sign. Apply.
4. Ask for Help
Cyber people love sharing what they know. Reach out. Ask questions. Ask for mentoring. “We know we need you”, Jemma says.
Final Words of Wisdom
We wrapped the conversation feeling inspired, informed, and more than a little in love with Jemma’s mission.
Cybersecurity isn't just about tech. It's about people. It’s about how we protect the ones we love, from our families to our customers to our colleagues. And it turns out the best way to do that?
Do it for the nans.
Want to learn more?
Listen to Scam Me’ here on YouTube: Learning Inclusive Change
Visit Culture Gem here: Culture Gem
Follow Inclusive Change on LinkedIn: Inclusive Change Ltd - and Facebook: Inclusive Change
And remember, cybersecurity starts with you!
Get Your FREE eBook
Digital Safety CIC - Online Resources
We know that we can tackle the problems we face alone - which is why we love working with others.
Thank you - you made the day INCREDIBLE!
Inclusive Change At Work CiC
Bradbury House
Wheatfield Road
Bradley Stoke
Bristol
BS32 9DB
Companies House: 13271923
ICO registration: ZZB293922
UK register of Learning providers
UKRLP: 10090653
Privacy Policy | Terms and Conditions
Copyright © 2025 Inclusive Change At Work CiC | All Rights Reserved