News Stay informed about the latest enterprise technology news and product updates.

Rising Stars: Most Influential Women in UK IT 2013

This year I had the pleasure of attending the judging sessions for the Most Influential Women in UK IT 2013.

Thank you to all of our judges for their input:

  • India Gary-Martin, managing director – Global COO, Investment Banking Technology & Operations, JP Morgan
  • Maggie Berry, founder of Women in Technology
  • Sheila Flavell, COO, FDM Group
  • Sarah Burnett – representing the BCSWomen group, and research vice-president at Nelson Hall
  • Eileen Brown – chair of Intellect’s women in technology committee, and CEO of Amastra
  • Belinda Parmar, author of Little Miss Geek and CEO of Lady Geek

 Faced with the challenge of trying to narrow down a long list of successful women in tech, a point was raised about some of the newer ladies who are just getting started in doing great things for the industry.

Unfortunately there were only 25 places on our Most Influential Women in UK IT 2013 list and the competition was high. However, the judges felt that a Rising Star category needed to be added so a handful of the ladies on the long list could be acknowledged for their work and their potential.

The criteria for Rising Star was: “An up-and-coming lady who did not make the top 25, but is someone who you feel is likely to be a contender to make the list next year.”

 

And our Rising Stars in no particular order:

 

  • Kathryn Parson, co-founder of Decoded
  • Wendy Tan-White, co-founder of Moonfruit
  • Sarah Wood, COO of Unruly Media
  • Angie Maguire, founder of Ladies Who Code
  • Zoe Cunningham, managing director of Softwire

 Congratulation to the ladies who made our Rising Stars list!

Photo gallery and bios to explain why they made the list to follow on Computer Weekly!

If you would like to be considered for next year’s longlist, or you would like to nominate someone, then please get in touch.

Enhanced by Zemanta

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close