ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.
The 9th annual ISSA-LA conference, the “premier cybersecurity event in Southern California,” came to a close after two successful days of opening and closing keynotes, panels, forums and training sessions. ITSPmagazine's Selena Templeton heard many great speakers, interviewed a handful of people, and networked with colleagues and conference attendees. This is her recap of the conference.
Dr. Uma Gupta, professor, STEM expert and highly-sought after motivational speaker, has studied human nature and its influence on our personal and professional lives. In this interview, she discusses diversity from a neurological point of view and explains why it’s about time that we change the conversation about the lack of diversity in cybersecurity and tech.
After decades of an average wage gap of 20% between men and women’s salaries for equal work, several cities and states have put their money where their mouth is by enacting legislation to make this illegal. How soon will all 50 States get on board with equal pay?
When a girl gets a Computer Engineer Barbie who needs the help of two boys to code, that sends a very clear message to her. Barbie may be modeled on life, but Mattel must realize that it needs to ensure that it models the doll on relevant, inclusive, diverse life.
The topic of diversity in the workplace has gotten more attention in the last few years, but what does that really mean in the tech industry? Many companies have put their money where their mouth is and created a Chief Diversity Officer position. Here are eight of them.
Former covert agent Valerie Plame compares working at the CIA to working in cybersecurity – and how she was able to use gender bias to her advantage.
The word “diversity” is about so much more than just hiring more women in the workplace. Dr. Uma Gupta discusses how the human brain actually thrives on diversity and why you should get dressed in reverse order.
Britain’s GCHQ has been actively recruiting neurodiverse people into their foreign espionage workforce, but it doesn’t take a 007 to figure out that the cybersecurity industry needs to broaden their pipeline and get more creative about recruiting more diverse individuals.
Would you feel comfortable hiring a hacker? Caroline Wong, CISSP and VP of Security Strategy at Cobalt, discusses the benefits and risks to using the power of the people – crowdsourced application security programs – at this OWASP AppSec session.
Since 76% of data breaches are from stolen login information. Jack Bicer, CEO of Sekur Me, says that eliminating passwords and using instant, automatic 2-factor authentication will eliminate fraudulent activities.
The new movie Hidden Figures, about three black female mathematicians at NASA who were key figures in the space program that sent the first American astronauts into space, is proving that role models who look like you makes all the difference.
Hidden Figures, the true story of three female African-American mathematicians whose expertise allows NASA to launch the program's first successful space mission, puts black women front and center in this movie as well as back on the history pages — where they belong.
When it comes to the tech/InfoSec/cybersecurity industries, how important is age? Should the number of times you’ve gone around the sun be irrelevant or does growing up with technology actually make you better qualified for a tech job?
In this interview, Carolyn April, senior director of industry analysis at CompTIA, sheds light on how companies can recruit more women into security careers to fill the growing skills gap. Plus, create your own personalized Rosie the Riveter avatar via Make Tech Her Story!
Although the word “neurodiversity” has been around since the late 1990s, not a lot of people are familiar with it. Simply put, this term describes the vast scope of differences in how people’s brains work and how they learn. Rather than a disadvantage in the workplace, neurological differences can offer a wider, more varied range of talent.
In 1963, President Kennedy signed The Equal Pay Act to ensure that discrimination of wages based solely on gender was eliminated. So why are we still dealing with wage discrimination in 2016?
From Ada Lovelace to Hedy Lamarr, women have been pioneers in the tech industry for as long as there has been a tech industry. So how did women’s status in this field go from rocket scientist to booth babe?
‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.
When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.