My last article for ITSPmagazine defined the term “technologist,” a label that applies to people working in companies of all shapes and sizes across the country along a broad spectrum of industries—not just those that write software and make hardware. in this new piece, we will take a look at the mentorship process for the next generation of technologists.
An embedded systems security researcher at Cisco, Jennie Kam provides a recap of the Women in Cybersecurity (WiCyS) Conference. Her highlights include a motivating talk from DEF CON Kids co-founder and teenage hacker, career guidance sessions from government, corporate and academia, a bold and refreshing Facebook panel, and several InfoSec workshops like the one led by Google.
Amy Brachio knows the challenges of making partner at EY while raising two daughters and caring for ailing parents, but what made it bearable was the professional and personal support she received at every step. As a leader, her goal is to foster an environment that provides the same support for others.
An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.
The World Economic Forum predicts that the gender gap won't close entirely until 2186. In celebration of International Women’s Day, Gail Coury, VP of risk management for Managed Cloud Services at Oracle, reminds us that we must all #BeBoldForChange if we went to sustain a workforce that meets the increasing demands of our digital world.
To meet the cybersecurity challenges we face on daily basis, practitioners should consider the five C's of enlightened security when evaluating new solutions and approaches — Comprehensive, Connected, Cloud, Continuous, Coverage.