My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.
ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.
An embedded systems security researcher at Cisco, Jennie Kam provides a recap of the Women in Cybersecurity (WiCyS) Conference. Her highlights include a motivating talk from DEF CON Kids co-founder and teenage hacker, career guidance sessions from government, corporate and academia, a bold and refreshing Facebook panel, and several InfoSec workshops like the one led by Google.
Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.
An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.
To meet the cybersecurity challenges we face on daily basis, practitioners should consider the five C's of enlightened security when evaluating new solutions and approaches — Comprehensive, Connected, Cloud, Continuous, Coverage.
When Director of Human Resources Amy Dolan started using a tool that flags sexist wording in their job descriptions, they increased their female employees from 28 to 44 in nine months. No one was more surprised than she was.
How does defending America with the weapons of war relate to preventing cyberattacks? Security Strategist for Carbon Black and former Marine, Rick McElroy, explains why military veterans make formidable cybersecurity warriors.
With more than 25 years’ experience in the IT field, ISACA Director Jo Stewart-Rattray has a lot of experience and advice to share. Determine what you want to do in technology, find your own path, and make it happen. And until you’ve actually tried something, don’t place imaginary obstacles in your own path.
The challenge of increasing gender diversity across the tech sector is not just an abstract problem, as Megan McCann, a woman who owns a tech talent business, knows very well. But rather than simply give lip service to this issue, she has taken action by co-founding ARA and provides these concrete ideas on championing your organization’s diversity efforts.
Putting together a cybersecurity workforce is similar to assembling a Super Hero Dream Team, explains Gene Fredriksen, CISO for PSCU, which services more than 800 credit unions. In this An InfoSec Life piece, Gene explains how he harks back to his love for superhero comic books in coming up with his cybersecurity dream team.