security talent

How to Mentor the Next generation of Technologists

My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.

Experts Panels On Security And Privacy At ISSA-LA Summit #9

ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.

Women in Cybersecurity (WiCyS) Conference Recap

An embedded systems security researcher at Cisco, Jennie Kam provides a recap of the Women in Cybersecurity (WiCyS) Conference. Her highlights include a motivating talk from DEF CON Kids co-founder and teenage hacker, career guidance sessions from government, corporate and academia, a bold and refreshing Facebook panel, and several InfoSec workshops like the one led by Google.

How I Pay It Forward and Build a Better Workplace in Cybersecurity

Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.

Curiosity Didn’t Get the Best of Him; It Led to a Career

An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.

Too Many Biases in Job Descriptions. Also, Are You Hiring Ninjas? Really?

When Director of Human Resources Amy Dolan started using a tool that flags sexist wording in their job descriptions, they increased their female employees from 28 to 44 in nine months. No one was more surprised than she was.

Veterans Are A Valuable Cybersecurity Workforce. Why?

How does defending America with the weapons of war relate to preventing cyberattacks? Security Strategist for Carbon Black and former Marine, Rick McElroy, explains why military veterans make formidable cybersecurity warriors.

Looking For Creative People To Fill Positions in Technology Space. True Story

With more than 25 years’ experience in the IT field, ISACA Director Jo Stewart-Rattray has a lot of experience and advice to share. Determine what you want to do in technology, find your own path, and make it happen. And until you’ve actually tried something, don’t place imaginary obstacles in your own path.

When Championing Diversity, Actions Speak Louder Than Words

The challenge of increasing gender diversity across the tech sector is not just an abstract problem, as Megan McCann, a woman who owns a tech talent business, knows very well. But rather than simply give lip service to this issue, she has taken action by co-founding ARA and provides these concrete ideas on championing your organization’s diversity efforts.

Can You Make My Cybersecurity Super Hero Dream Team?

Putting together a cybersecurity workforce is similar to assembling a Super Hero Dream Team, explains Gene Fredriksen, CISO for PSCU, which services more than 800 credit unions. In this An InfoSec Life piece, Gene explains how he harks back to his love for superhero comic books in coming up with his cybersecurity dream team.