Selena Templeton

Experts Panels On Security And Privacy At ISSA-LA Summit #9

ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.

ISSA-LA Conference #9 Was So Good, We Can’t Wait For #10

The 9th annual ISSA-LA conference, the “premier cybersecurity event in Southern California,” came to a close after two successful days of opening and closing keynotes, panels, forums and training sessions. ITSPmagazine's Selena Templeton heard many great speakers, interviewed a handful of people, and networked with colleagues and conference attendees. This is her recap of the conference.

We Need to Bring Diversity to the Idea of Diversity

Dr. Uma Gupta, professor, STEM expert and highly-sought after motivational speaker, has studied human nature and its influence on our personal and professional lives. In this interview, she discusses diversity from a neurological point of view and explains why it’s about time that we change the conversation about the lack of diversity in cybersecurity and tech.

One Small Step for Woman, One Giant Leap for Equal Pay – Kind Of...

After decades of an average wage gap of 20% between men and women’s salaries for equal work, several cities and states have put their money where their mouth is by enacting legislation to make this illegal. How soon will all 50 States get on board with equal pay?

What Could Be the Mysterious Reason Why Girls Are Not Interested in Tech Careers?

When a girl gets a Computer Engineer Barbie who needs the help of two boys to code, that sends a very clear message to her. Barbie may be modeled on life, but Mattel must realize that it needs to ensure that it models the doll on relevant, inclusive, diverse life.

8 Companies with Chief Diversity Officer Positions

The topic of diversity in the workplace has gotten more attention in the last few years, but what does that really mean in the tech industry? Many companies have put their money where their mouth is and created a Chief Diversity Officer position. Here are eight of them.

Can Women in Intelligence Use Gender Bias to Their Advantage?

Former covert agent Valerie Plame compares working at the CIA to working in cybersecurity –  and how she was able to use gender bias to her advantage.

Dr. Uma Gupta Says That Workplace Diversity Begins With Self

The word “diversity” is about so much more than just hiring more women in the workplace. Dr. Uma Gupta discusses how the human brain actually thrives on diversity and why you should get dressed in reverse order.

The Modern-Day James Bond Is Autistic, Dyslexic or a Mother

Britain’s GCHQ has been actively recruiting neurodiverse people into their foreign espionage workforce, but it doesn’t take a 007 to figure out that the cybersecurity industry needs to broaden their pipeline and get more creative about recruiting more diverse individuals.

Crowdsourced Application Security: The Human Power

Would you feel comfortable hiring a hacker? Caroline Wong, CISSP and VP of Security Strategy at Cobalt, discusses the benefits and risks to using the power of the people – crowdsourced application security programs – at this OWASP AppSec session.

Hidden Figures of Past and Present, as Inspiration for Future Generations

The new movie Hidden Figures, about three black female mathematicians at NASA who were key figures in the space program that sent the first American astronauts into space, is proving that role models who look like you makes all the difference.

Katherine Johnson, a Hidden Figure, a Woman in Technology

Hidden Figures, the true story of three female African-American mathematicians whose expertise allows NASA to launch the program's first successful space mission, puts black women front and center in this movie as well as back on the history pages — where they belong.

Ageism in the Tech Industry & Other Bias. Let’s Fight ‘Em All

When it comes to the tech/InfoSec/cybersecurity industries, how important is age? Should the number of times you’ve gone around the sun be irrelevant or does growing up with technology actually make you better qualified for a tech job?

Women in IT Security? Of Course "We Can Do IT"

In this interview, Carolyn April, senior director of industry analysis at CompTIA, sheds light on how companies can recruit more women into security careers to fill the growing skills gap. Plus, create your own personalized Rosie the Riveter avatar via Make Tech Her Story!

In Neurodiversity There Is Beauty, Strength, And Skills You Don’t Have

Although the word “neurodiversity” has been around since the late 1990s, not a lot of people are familiar with it. Simply put, this term describes the vast scope of differences in how people’s brains work and how they learn. Rather than a disadvantage in the workplace, neurological differences can offer a wider, more varied range of talent.

Equal Pay Act Of 1963? We Are Going Backward

In 1963, President Kennedy signed The Equal Pay Act to ensure that discrimination of wages based solely on gender was eliminated. So why are we still dealing with wage discrimination in 2016?

The Secret History of Women in Tech

From Ada Lovelace to Hedy Lamarr, women have been pioneers in the tech industry for as long as there has been a tech industry. So how did women’s status in this field go from rocket scientist to booth babe?

2 Factors Might Be Better Than 1, But Is It Enough?

‘Compliance does not equal security’ was the mantra of this session called Two-Factor Isn’t Enough – We Show You Why. Ryan Rowcliffe of SecureAuth reminded us that merely having a two-factor authentication technology in place isn’t nearly safe enough because when it comes to convenience, people will almost always eschew security measures.

Curiosity Killed the Cat and Other Cybersecurity Horror Stories

When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.