POPULARITY
Jessica Gulick — Founder and Commissioner of the US Cyber Games, CEO of the cyber marketing firm Katzcy, and someone who values perseverance over perfection Jessica Gulick is a woman of many trades. She is the Founder and CEO of the cyber marketing firm Katzcy, the Founder and Commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields P.A.'s Jack Clabby and KnowBe4's Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career. She also talks about the inception of the US Cyber Games, its commitment to bringing together elite cyber athletes, coaches, and industry leaders, and the purpose she hopes it will serve in the cyber world. Jack and Kayley also discuss the recent developments of Droidish, which may sound like a new Star Trek language but is actually the language being developed by the US military to allow AI drones to communicate with one another to become useful “tools” for many different purposes. You can follow Jessica on LinkedIn here: https://www.linkedin.com/in/jessicagulick/ You can follow Jessica on Twitter here: @CyberRiskLady You can learn more about US Cyber Games here: https://www.playcyber.com/
Guest: Nikki Robinson, DSc, PhD, Security Architect at IBMOn LinkedIn | https://www.linkedin.com/in/ACoAACvFM8sBiEX_BJr6dIgw-ACWfS1I-ZJg3OM__________________________SponsorsAre you interested in sponsoring an ITSPmagazine Channel?
Guest: Jessica Bishop, SOC Analyst II, Ideal IntegrationsOn LinkedIn | https://www.linkedin.com/in/jessica-bishop-%F0%9F%A7%AD-262729b4/Hosts:Jax ScottOn ITSPmagazine
Guest: Karlin Clayton, On LinkedIn | https://www.linkedin.com/in/karlin-clayton-live-to-learn/Hosts:Jax ScottOn ITSPmagazine
Guest: Haseeb Awan, CEO and Founder at EFANI Secure Mobile [@efani]On Twitter | https://twitter.com/haseebOn LinkedIn | https://linkedin.com/in/haseebawanWebsite | https://haseebawan.com/Hosts:Jax ScottOn ITSPmagazine
Hosts:Jax ScottOn ITSPmagazine
Guest: Kevin JohnsonOn Twitter | https://twitter.com/secureideasOn LinkedIn | https://www.linkedin.com/in/kevinjohnson/On Mastodon | https://infosec.exchange/@secureideas________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Jason HaddixOn Twitter | https://twitter.com/JhaddixOn LinkedIn | https://www.linkedin.com/in/jhaddix/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Liz MillerOn Twitter | https://twitter.com/lizkmillerOn LinkedIn | https://www.linkedin.com/in/lizkmiller/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Adam ShostackOn Twitter | https://twitter.com/done_with_thatOn LinkedIn | https://www.linkedin.com/in/shostack/On Mastodon | infosec.exchange/@adamshostack________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Chris Roberts, CISO, Boom Supersonic [@boomaero]On Twitter | https://twitter.com/Sidragon1On LinkedIn | https://www.linkedin.com/in/sidragon1/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Jess Vachon, Chief Information Security Officer, Context Labs BV [@contextlabsbv]On Mastodon | https://infosec.exchange/@infosec_jessOn Twitter | https://twitter.com/infosec_jessOn LinkedIn | https://www.linkedin.com/in/jessvachon1/________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Kayla Williams, CISO, Devo [@devo_inc] and co-host of the Locked Down Podcast on ITSPmagazineOn ITSPmagazine
Guest: Jerry Bell, VP and CISO, IBM Public Cloud [@IBM | @IBMcloud] and founder & co-host of the Defensive Security Podcast [@defensivesec]On Mastodon | https://infosec.exchange/@jerryOn Twitter | https://twitter.com/MaliciouslinkOn LinkedIn | https://www.linkedin.com/in/maliciouslink/InfoSec.Exchange | https://infosec.exchange/home________________________________Host: Alyssa MillerOn ITSPmagazine
Guest: Tricia Howard, Senior Technical Writer II at Akamai Technologies [@Akamai]On Mastodon | https://infosec.exchange/@triciakickssaasOn Twitter | https://twitter.com/TriciaKicksSaaSOn LinkedIn | http://linkedin.com/in/triciakickssaasWebsite | https://triciakickssaas.com/________________________________Host: Alyssa MillerOn ITSPmagazine
GuestHelen PattonChief Information Security Officer, Cisco Security Business Group [@CiscoSecure], Cisco [@Cisco]On Mastodon | https://infosec.exchange/@cisohelenOn Twitter | https://twitter.com/CisoHelenOn LinkedIn | https://www.linkedin.com/in/helenpatton/Website | https://www.cisohelen.com/HostAlyssa MillerOn ITSPmagazine
GuestBill DiekmannBISO, Director of Security and Architecture at Cupertino Electric [@CupertinoEl]On Mastodon | https://infosec.exchange/@bdiekmannOn Twitter | https://twitter.com/bdiekmannOn LinkedIn | https://www.linkedin.com/in/bdiekmann/HostAlyssa MillerOn ITSPmagazine
GuestJosh NickelsCyber Security Engineer at Dematic [@DematicGlobal]On Mastodon | https://infosec.exchange/@ImlordoftheringOn Twitter | https://twitter.com/imlordoftheringOn LinkedIn | https://www.linkedin.com/in/josh-nickels/HostAlyssa MillerOn ITSPmagazine
HostsJax ScottOn ITSPmagazine
GuestGina YaconeCISO (Advisory) at Trace3 [@trace3]On Twitter | https://twitter.com/gina_yaconeOn LinkedIn | https://www.linkedin.com/in/ginayacone/HostAlyssa MillerOn ITSPmagazine
HostsJax ScottOn ITSPmagazine
GuestMaril Vernon"One Woman Purple Team" | Co-founder of The Cyber Queens Podcast | Purple Team Lead/Sr SE | Social Engineer | Physical Pentest | CTI | Administrative Officer- Offensive Ops @ CSFI | MSCSIAOn Twitter | https://twitter.com/shewhohacksOn LinkedIn | https://www.linkedin.com/in/marilvernon/HostAlyssa MillerOn ITSPmagazine
GuestNick BarkerSystem Analyst, LightPoint NW,a Meriplex Systems CompanyOn LinkedIn | https://linkedin.com/in/nicqbHostsJax ScottOn ITSPmagazine
GuestLesley CarhartDirector of ICS Cybersecurity Incident Response at Dragos [@DragosInc]On Twitter | https://twitter.com/hacks4pancakesOn LinkedIn | https://www.linkedin.com/in/lcarhart/Website | https://tisiphone.net/HostAlyssa MillerOn ITSPmagazine
GuestEric J. Belardo, The "Cyber Papa"Founder at Raices Cyber Org [@RaicesCyberOrg]On Twitter | https://twitter.com/ebelardo73On LinkedIn | https://www.linkedin.com/in/ebelardo/On YouTube | https://www.youtube.com/EricBelardoCyberHostAlyssa MillerOn ITSPmagazine
GuestEric TaylorFounder, Barricade Cyber Solutions [@barricadecyber]On Twitter | https://twitter.com/bcs_erictaylorOn LinkedIn | https://www.linkedin.com/in/ransomware/HostsJax ScottOn ITSPmagazine
HostAlyssa MillerOn ITSPmagazine
GuestPhil SwaimOn Twitter | https://twitter.com/0DDJ0BBOn LinkedIn | https://www.linkedin.com/in/phillipswaim/HostAlyssa MillerOn ITSPmagazine
HostsJax ScottOn ITSPmagazine
Movie producer, award-winning filmmaker, and viral sensation, Alissa Knight joins 2 Cyber Chicks for an authentic chat about her career from hacker to producer and her accolades in between. Alissa is a pioneer in the industry and revolutionizes cybersecurity content while paving the way for future generations. Tune in to hear about her upcoming projects (you heard it here first!!!) and get to know more about this AMAZING cyber chick.__________________________GuestAlissa KnightPartner, Knight Group | Director & Executive Producer, Knight Studios | Managing Partner, Knight Events | Partner, Knight Ink [@knightinkmedia]On Twitter | https://twitter.com/alissaknightOn LinkedIn | https://www.linkedin.com/in/alissaknight/On YouTube | https://www.youtube.com/c/AlissaKnight__________________________HostsJax ScottOn ITSPmagazine
Today's guest is Derrick @CanBusDutch. They talk about embedded systems security, in particular in vehicles (i.e. CAN Bus architectures).________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestFordOn Twitter | https://twitter.com/wrentreeco________________________________HostAlyssa MillerOn ITSPmagazine
Today's guest is Ford @wrentreeco.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestFordOn Twitter | https://twitter.com/wrentreeco________________________________HostAlyssa MillerOn ITSPmagazine
Join this 2 Cyber Chicks discussion to hear about Jon's dynamic journey - from the rodeo, the marine corp, and his pivot into data systems.Jon provides perspective through his own story - how being open-minded, leveraging opportunities, and asking for help has helped him get to where he is today. In his “free time,” Jon runs a podcast and is a board member for a Veteran nonprofit. If you're curious about military transition, transitioning into the tech/cyberspace, and learning some tips along the way, this one's for you!__________________________GuestJonathan ColeSenior Military Systems Specialist I / Network Engineer, Scientific Research Corporation [@WorkingAtSRC]On LinkedIn | https://www.linkedin.com/in/jonathan-m-cole/__________________________HostsJax ScottOn ITSPmagazine
Today's guest is award-winning author, Stefani Goerlich.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestStefani GoerlichAuthor and Clinician focusing on Gender, Sexuality and Relationship DiversitiesOn LinkedIn | https://www.linkedin.com/in/sgoerlich/On Twitter | https://twitter.com/Tzefira_Neviah________________________________HostAlyssa MillerOn ITSPmagazine
Today's guest is Frank McGovern. Larry talks about the role of the security architect and the Blue Team Con event.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestFrank McGovernCybersecurity Architect at StoneX Group [@StoneX_Official] and Founder at Blue Team Con [@BlueTeamCon]On LinkedIn | https://www.linkedin.com/in/frankmcgovern/On Twitter | https://twitter.com/FrankMcG________________________________HostAlyssa MillerOn ITSPmagazine
Delia's journey started with audio engineering, and since then, she's gained experience within the DevOps engineering side of the house, cloud operations, program management, and more.We chat through the benefits of working “on call”, community involvement, masters programs, and how you can pave your own way. Delia shares some tips on landing your first internship, securing a full-time position after your internship, and seeking out mentorship.Delia is formally educated in technology, has performed research work, frequents volunteer work, and has held titles with a few extremely well-known organizations.__________________________GuestDelia DrummSr. Security Technical Program Manager at Databricks [@databricks]On LinkedIn | https://www.linkedin.com/in/deliadrumm__________________________HostsJax ScottOn ITSPmagazine
Today's guest is Larry Whitseside Jr.Larry talks about his team at a new job trying to give him admin access and he had to say no. It's refreshing in leadership roles to be able to say, "Nope, there's no reason I should have admin." A nod to having skilled teams you trust.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestLarry Whiteside Jr.Chief Security Officer at Women's Care and Co-Founder / President at Cyversity [@OneCyversity]On LinkedIn | https://www.linkedin.com/in/larrywhitesidejr/On Twitter | https://twitter.com/LarryWhiteside________________________________HostAlyssa MillerOn ITSPmagazine
Join Jax and Erika as they exchange tips and tricks on finding your groove in a way that works for you. With Cybersecurity being a demanding space, finding the appropriate balance between work and life is a challenge. How do you build boundaries when there's so much to learn, so many threat actors, and an ever-growing to-do list? These 2 cyber chicks share their personal experiences with burnout, re-prioritization, and building healthy guardrails.__________________________HostsJax ScottOn ITSPmagazine
Today's guest is Kevin Jackson.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestKevin JacksonChief Executive Officer at Level 6 Cybersecurity [@Level6Cyber]On LinkedIn | https://www.linkedin.com/in/kevin-jackson-485b327/On Twitter | https://twitter.com/kevinj_cyber1________________________________HostAlyssa MillerOn ITSPmagazine
Ken Underhill's CyberLife.Tv is the ONLY Cybersecurity television show out there. This impressive television personality has been featured in Forbes, Reader's Digest, Medium, Tech Republic, Fox, NBC, Dark Reading, Voyage Houston Magazine, MSN Money, and many more places.Ken shares the history behind his television debut, the secret to successful branding, the circle of focus, and plenty of tips and tricks along the way!Ken's background ranges from pediatric nursing to the IT side of the house.. He has a master of science in Cybersecurity and Information Assurance. He holds board seats and advisory roles for several organizations. His TV show streams on over 100 platforms and averages over $2 million viewers per month.__________________________GuestKen UnderhillCEO, Executive Producer, Television Show Host at Cyber LifeOn LinkedIn | https://www.linkedin.com/in/kenunderhill/On YouTube | https://www.youtube.com/c/CyberLifeTVHostsJax ScottOn ITSPmagazine
Today's guest is Jessica Robinson. She and Alyssa talked about Consciously Secure Living and her origin story in launching PurePoint International.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestJessica RobinsonFounder at PurePoint InternationalOn LinkedIn | https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/On Twitter | https://twitter.com/jessrobin96________________________________HostAlyssa MillerOn ITSPmagazine
The state of enterprise and ICS cybersecurity across the public, private, and academia sectors; how to successfully share more information with each other, and so much more ... all on this week's episode with Chuck Brooks.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestChuck BrooksAdjunct Professor at Georgetown University's Graduate Applied Intelligence Program [@GeorgetownSCS]On LinkedIn | https://www.linkedin.com/in/chuckbrooks/On Twitter | https://twitter.com/ChuckDBrooks________________________________HostAlyssa MillerOn ITSPmagazine
Dr. Wendy joins Jax and Erika to discuss her transition into the Cybersecurity industry, while sharing hot tips and tricks for our listeners. After earning her Ph.D. in medical genetics from Oxford University, she leveraged her analytics expertise and established a background in infrastructure and cloud security.Dr. Wendy's impressive experience ranges from aerospace, healthcare, financial services, consulting, telecommunications, transport logistics, and national infrastructure. In this chat, she provides valuable feedback on entering the industry, establishing credibility through thought leadership, and getting more speaking engagements under your belt.__________________________GuestDr. Wendy NgPrincipal Cloud Security Architect at OneWeb [@OpenWebHQ]On LinkedIn | https://uk.linkedin.com/in/wendyng1HostsJax ScottOn ITSPmagazine
One of our favorite guests is back with new nuggets of knowledge! How should we look on video conference calls? Leadership positions with sales numbers - how can we ramp up sales experience, without the traditional sales training? Her latest project: Monday motivation series, her new audio series through LinkedIn 10 EST LIVE, Unfiltered! The need for informal leadership and how to best prepare for performance reviews!Elizabeth's work focuses on igniting emotional engagement and rallying teams around the Noble Purpose of customers. Elizabeth has spoken at LinkedIn Talent Connect, facilitated a "Millennial Talent Intervention" program for a school system, and designed virtual learning bursts for global sales teams. Some of her work has been featured on NPR and in The Wall Street Journal.__________________________GuestElizabeth LotardoVP of Client Services, McLeod&More [@lisaearlemcleod]On LinkedIn | https://www.linkedin.com/in/elizabethlotardoHostsJax ScottOn ITSPmagazine
Have a listen as Alyssa and Liz entertain each other and their audience.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestElizabeth WhartonAdvisory Board at Rural Technology Fund [@ruraltechfund] and VO Operations at SCYTHEOn LinkedIn | https://www.linkedin.com/in/elizabeth-wharton/On Twitter | https://twitter.com/LawyerLiz________________________________HostAlyssa MillerOn ITSPmagazine
What do kinky boots have to do with building bridges between security and the business, take a listen to this discussion between Alyssa and her guest Larisa Breton.They delve into the power of finding common ground and how that can build stronger collaboration and alignment.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestLarisa BretonPresident at FullCircle CommunicationsOn LinkedIn | https://www.linkedin.com/in/larisabretonfullcircle/On Twitter | https://twitter.com/TweetLarisa________________________________HostAlyssa MillerOn ITSPmagazine
RSAC 2022 interview with Brooke Motta, the CEO & Co-Founder of a groundbreaking start-up to help organizations secure their Kubernetes.During this interview Brooke shares her journey as a woman in cybersecurity, and her thoughts on how we are doing as a community within diversity and inclusion. She provides her insights on how we can drive change and support the newer generation breaking into cybersecurity.__________________________GuestBrooke MottaCEO / Co-FounderOn LinkedIn | https://www.linkedin.com/in/brookemotta/__________________________HostsJax ScottOn ITSPmagazine
Courtney Cohen did not take a traditional route into cybersecurity. She started working in humanitarian assistance for an agriculture tech company leveraging technology to help farmers improve their business in the face of climate change to being a Senior Director at CyberGRX.During this discussion listen to Courtney's story of going from the NGO and agriculture world into the software world. She shares her take on being an executive woman in cybersecurity and the impacts of being in-person at RSA.__________________________GuestCourtney CohenSenior Director of Product at CyberGRX [@cybergrx]On LinkedIn | https://www.linkedin.com/in/courtney-cohen-1010/ HostsJax ScottOn ITSPmagazine
Streaming live from RSA Conference 2022, Alyssa Miller is joined by Jen Easterly, Director, Cybersecurity & Infrastructure Security Agency (CISA) to discuss her journey and role at CISA, public/private sector collaboration, the increased focused on the human element, and so much more.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestJen
In this episode, Alyssa talks to author and CEO, Theresa M Payton, about identifying and addressing the problems we need to solve in risk and security management.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestTheresa M PaytonCEO at Fortalice Solutions [@FortaliceLLC] and Author of Manipulated: Inside the Cyberwar to Hijack Elections and Distort the TruthOn LinkedIn | https://www.linkedin.com/in/theresapayton/On Twitter | https://twitter.com/TrackerPayton________________________________HostAlyssa MillerOn ITSPmagazine
In this episode, Alyssa talks to Andra Zaharia, Cyber Empathy podcast host and cybersecurity content marketer.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestAndra ZahariaPodcast Host at Cyber Empathy Podcast and Cybersecurity Content Marketer at The Content HabitWebsite: http://andrazaharia.com/On LinkedIn | https://www.linkedin.com/in/andrazaharia/On Twitter | https://twitter.com/AndraZaharia________________________________HostAlyssa MillerOn ITSPmagazine
In this episode, Alyssa talks to Malcolm Harkins, Chief Security & Trust Officer.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestMalcolm M HarkinsChief Security & Trust Officer at Epiphany Systems [@EpipSys]On LinkedIn | https://www.linkedin.com/in/malcolmharkins/On Twitter | https://twitter.com/ProtectToEnable________________________________HostAlyssa MillerOn ITSPmagazine
In this episode, Alyssa talks to Dr Olivia Snow about a topic that doesn't get nearly enough attention. So, pay attention and perhaps you'll get a new perspective.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestDr Olivia SnowResearch fellow, sex wørk & tech @C2i2_UCLA, @AINowInstituteOn Twitter | https://twitter.com/MistressSnowPhD________________________________HostAlyssa MillerOn ITSPmagazine
These 2 Cyber Chicks catch up with ajay Menendez - ajay is a military veteran and a cyber expert with over 30 years in this space. Tune in for more about threat intelligence, his take on learning and development in cyber, whether any social platforms are truly “secure” or private, and how to level up your LinkedIn recommendation game. And, most importantly: what do cyber professionals need to learn from Confucianism?__________________________Guestajay MenendezCEO, Black Tower Security and Associate Director of Cybersecurity at HackerUOn Twitter | https://twitter.com/paladin63On LinkedIn | https://www.linkedin.com/in/ajaymenendez/ HostsJax ScottOn ITSPmagazine
At an early age, Daniel Hall was fortunate to discover his creative outlet within software development. Coming from an abusive orphanage home to teaching coding to college students at the age of 13 to hacking the app, Clubhouse. Dan has dedicated 45 years to the technology field but beyond that, he provides a powerful voice in our industry. Join us for a heartfelt talk about success, authenticity, family, and the importance of kindness.__________________________GuestDaniel HallProgrammer at DocuTrac, IncOn LinkedIn | https://www.linkedin.com/in/danielbhall/HostsJax ScottOn ITSPmagazine
In this episode, Alyssa talks to "the other Alissa" about speaking at cybersecurity conferences, preparing a novel talk for your call-for-papers (CFP) submission, and the value of telling these stories to audiences everywhere even if you don't think anyone would be interested.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestAlissa DNSprincessCOO @CircleCityConOn Twitter | https://twitter.com/dnsprincess________________________________HostAlyssa MillerOn ITSPmagazine
Jax and Erika sit down for a long-awaited chat with the one and only, “Haunted Hacker,” Mike Jones. Mike shares his journey in the dark arts, his involvement with Anonymous, and lessons learned from a career dedicated to hacking. We tap into topics like the Colonial Pipeline, ransomware, our critical infrastructure; and to spice things up, Mike just moved into a haunted apartment.__________________________GuestMike JonesThe Haunted HackerOn LinkedIn | https://www.linkedin.com/in/mikejonesnotanalias/On Twitter | https://twitter.com/H4unt3dHOn Facebook | https://www.facebook.com/HauntedHacker/On YouTube | https://www.youtube.com/c/H4unt3dHacker/videosHostsJax ScottOn ITSPmagazine
In this episode, Alyssa talks to Andy Ellis about presenting security to the business in a way that encourages them to participate.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestAndy EllisAdvisory CISO at Orca Security [@orcasec]On Twitter | https://twitter.com/csoandyOn LinkedIn | https://www.linkedin.com/in/csoandy/________________________________HostAlyssa MillerOn ITSPmagazine
In this episode, Alyssa talks to Simon Maple about dev adoption and empowerment, security champions teams, and much, much more.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestSimon MapleField CTO at Snyk [@snyksec]On Twitter | https://twitter.com/sjmapleOn LinkedIn | https://www.linkedin.com/in/simonmaple/________________________________HostAlyssa MillerOn ITSPmagazine
Have you found your noble purpose? Elizabeth is a VP of client services, a consultant, a LinkedIn Learning Instructor, mentor, and an author. Join us for this engaging conversation around what it means to find your noble purpose, how to empower your employees, and a dive into the “Great Resignation” and how our workforce has been impacted by the pandemic.Elizabeth's work focuses on igniting emotional engagement and rallying teams around the Noble Purpose of customers. Elizabeth has spoken at LinkedIn Talent Connect, facilitated a "Millennial Talent Intervention" program for a school system, and designed virtual learning bursts for global sales teams. Some of her work has been featured on NPR and in The Wall Street Journal. She has authored LinkedIn Learning courses.__________________________GuestElizabeth LotardoVP of Client Services, McLeod&More [@lisaearlemcleod]On LinkedIn | https://www.linkedin.com/in/elizabethlotardoHostsJax ScottOn ITSPmagazine
In this episode, Alyssa talks to Jeff Man about everything from three letter agencies to three letter compliance programs. They discuss the business value of compliance, how it can be used to drive better messaging, and where we fall short in risk discussions in particular.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestJeff ManSr. Information Security Consultant at Online Business Systems [@obs_global] and Co-Host, Paul's Security Weekly Podcast [@SecWeekly]On Twitter | https://twitter.com/MrJeffManOn LinkedIn | https://www.linkedin.com/in/jeffreyeman/________________________________HostAlyssa MillerOn ITSPmagazine
In this episode, Wolfgang Goerlich, Advisory CISO and Strategist at Cisco, joined Alyssa to talk about security geese, the value of (or lack thereof) user awareness training programs, anti-phishing campaigns, and so much more.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestWolfgang GoerlichAdvisory CISO and Strategist at Cisco [@Cisco | @duosec ]On Twitter | https://twitter.com/jwgoerlichOn LinkedIn | https://www.linkedin.com/in/jwgoerlich/________________________________HostAlyssa MillerOn ITSPmagazine
Join 2CyberChicks, Erika and Jax, as they meet with Ashley Wicks, a cyber security professional who shares her journey breaking into the cybersecurity space. She shares her wins and challenges and provides hacks for certifications prep, interviews and finding mentorship.“Work with what you got but keep your eye on what you want”Ashley provides an insightful perspective on finding your place in the cyber industry.__________________________GuestAshley WicksCyber Security Analyst, Culture Amp [@cultureamp]On LinkedIn | https://www.linkedin.com/in/ashley-w-2891391a3/HostsJax ScottOn ITSPmagazine
In this episode, Jules Okafor, founder and CEO of RevolutionCyber joined Alyssa to talk about the importance of an enabled security culture. They touch on lessons in communication that can be learned from the Okta breach as well as how the same concepts used in the board room extend all the way to across the security organization to even front line defenders.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestJules OkaforChief Executive Officer & Founder at RevolutionCyber [@RevCyberSec]On Twitter | https://twitter.com/julesmgmtOn LinkedIn | https://www.linkedin.com/in/julesmgmt/________________________________HostAlyssa MillerOn ITSPmagazine
In this episode, Alyssa Miller has Accidental CISO on the show | Securing Bridges Episode 2It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube. Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestAccidental CISOOn Twitter | https://twitter.com/AccidentalCISOBlog | https://www.accidentalciso.net/________________________________HostAlyssa MillerOn ITSPmagazine
Have you ever wondered what the Governance, Risk and Compliance (GRC) space looks like? We are joined by our subject matter expert, Josh Jackson, for a chat that encompasses his diverse experience - from chemistry, to policy, to teaching law and governance of technology and artificial intelligence.If you're curious about the latest with CMMC, how the cloud has shaken up the GRC space or how it impacts responsibilities on the security front, check this episode out!__________________________GuestJosh JacksonSr. Account Executive at Rackspace Technology [@Rackspace]On LinkedIn | https://www.linkedin.com/in/joshjacksonco/HostsJax ScottOn ITSPmagazine
In this episode, Alyssa Miller has Keyaan Williams on the show.________________________________GuestKeyaan WilliamsManaging DirectorManaging Director, Cyber Leadership and Strategy Solutions, LLC (CLASS-LLC) [@_CLASSllc]On Linkedin | https://www.linkedin.com/in/keyaan/________________________________HostAlyssa MillerOn ITSPmagazine
March is Women's history month and this episode Darnley wanted to dedicate to Women who are looking to join the Cybersecurity field. IT/Cybersecurity was dominated by men, but a shift has occurred with the encouragement by many to get more women involved in this field. Hear Darnley's experience in planting the idea seed to our girl youth to take up a career in cybersec.
During this episode, Jax and Erika have the exciting opportunity to interview their bosses, the founders of ITSPmagazine.Marco and Sean complement one another with their backgrounds - Sean brings the technology and cyber experiences while Marco brings the advertising and political science backgrounds, and together, their mission is to share stories with the hopes of educating the community. If you're curious as to how a podcast/webcast hosting platform comes to life, this is an episode you don't want to miss!A good story connects us. A good story makes us imagine and visualize a scenario; it makes us think and feel; it drives us to take action. ITSPmagazine is designed to accomplish these same things.__________________________GuestsSean Martin, CISSPCo-Founder, ITSPmagazineOn ITSPmagazine
Join 2CyberChicks for an exciting interview with the FBI's very own, Matt Halvorsen. Matt brings a wealth of knowledge on how to reduce risk and the different types of threats to the supply chain.In this insightful episode, we dive into the risks associated with open source software and risks that were highlighted since the pandemic.__________________________GuestMatt HalvorsenStrategic Program Manager, FBIOn LinkedIn | https://www.linkedin.com/in/matthew-halvorsen-a016a75b/HostsJax ScottOn ITSPmagazine
Jax and Erika bring in the new year with some exciting news!Hackerz and Haecksen is getting a makeover - tune in to get the latest scoop!__________________________HostsJax ScottOn ITSPmagazine
In this episode, hosts TJ Null and Harbinger talk infosec with S1REN, a very accomplished member of the community and a moderator of OffSec's Discord. Among other things, they discuss how S1REN got into infosec and why, some advice for women looking to get into infosec, and why BASH, Python, and TCP/IP are so essential for people to get into before getting into security. They also touch on good ways to break into infosec and some things S1REN would like to see changed in the infosec field.
In this episode, we deviate a bit from our traditional topics to incorporate the growing diversity in the Infosec world. In the past, this has been a male dominated field, but the culture is changing. Our guest today is Eleanor Dallway. Eleanor is the Editorial Director at Infosecurity Magazine, and she is at the front of the security industry. She has more than 15 years of online job experience and knows more about information security than most English Literature graduates should. She spends her working days interviewing industry professionals, keeping the website updated with news on a regular basis, editing the magazine, and attending industry events. Show Notes: [1:03] - Eleanor’s experience in Infosec began in 2006 when she started working for Infosecurity Magazine. She also has experience editing for a wine and spirits magazine as well as one for retail. [2:03] - Eleanor admits that information security is her favorite, because she’s worked in it the longest and it is constantly changing. [2:51] - Her favorite part of her job is interviewing industry professionals. She shares several famous individuals who she has been able to interview. [4:18] - Eleanor admits that she was very nervous to interview Kevin Mitnick and describes the experience. [5:57] - Kevin Mitnick did magic tricks for Eleanor for fun, but demonstrated how con artists are very much like magicians. [9:55] - Chris and Eleanor chat about their different interviews with previous podcast guest John McAfee. [11:14] - John McAfee spoke an unscripted rant at an event that Eleanor was able to be present for. [12:30] - Infosec trends are compared to fashion trends because they are cyclical and come back again. [13:38] - Some trends that Eleanor discusses are the Cloud, artificial intelligence, and the focus on the human side of security. [15:13] - Awareness now is much different than it was 15 years ago when Eleanor began working for Infosecurity Magazine. Now, they are major headlines and mainstream news. [16:48] - Eleanor’s company puts in software that randomly tests people. [19:31] - We start to distrust people who are actually trustworthy and tend to become cynical. [20:18] - The types of scams that trend ebb and flow. Sometimes the trend is text scams, emails, or phone calls, generally speaking. [21:40] - There are clever scammers who use the current climate to change their approach. Eleanor shares that she has seen a lot of scams with packages delivered because more people are shopping online. [23:56] - When someone targets Eleanor, she knows she can handle it, but she gets very angry when scammers target her parents and grandmother. [25:52] - Eleanor discusses various conferences and events. She doesn’t tend to worry about heavy security for some of them, but for several of them, she takes every precaution. [28:10] - For the most part, Eleanor tends to go to more of the businessy conferences. [30:42] - Eleanor admits that most of the things on her phone or computer are not that interesting so she feels comfortable taking her devices with her to other countries when traveling. [31:28] - In regards to women in the industry, Eleanor says that it is still male dominated but it is moving in the right direction. [32:48] - Eleanor has worked with programs that encourage teenage girls in high school to get into the infosec and technology world. [33:25] - Eleanor launched Women in Cybersecurity Networking Group that began small in the UK but is now national. The purpose is to create a community. [35:02] - Marketing cybersecurity needs a lot of change to include more accurate images and descriptions. [36:11] - There’s a lot of going on in this space in regards to diversity in the industry, but Eleanor feels that it is not being done quickly enough. [37:33] - The security industry is very resilient and has not been hurt by the pandemic except that they are shorthanded. Unemployment is high in many places, so people should be jumping ship and going into it. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Infosecurity Magazine Web Page Women in Cybersecurity Networking Group Eleanor Dallaway on Twitter Eleanor Dallaway on LinkedIn
Keya was a public school teacher who stood out of the crowd. She loves problem solving and challenging environments. Keya was also a filmmaker and web designer. She's currently a detection security engineer who get knee deep in malware on a daily basis.Notes:Knew she didn't want to be a teacher her whole lifeWas the only one in the rational thinking group at her school.Enjoys rational thinking and the problem solving process.Prototyped a mock medical device with a Raspberry Pi and won a national competition!Quotes:"Easy to get in to what you're comfortable with... and I didn't want to have a job like that.""It was something that I enjoyed but I definitely feel more at home with the cohort that I work with currently and with what I do.""... for me it was an amazing process because I hadn't ever SSH’d into a device and I had to figure out how to get like ports scan.""I read so much documentation on all the little things that we connected to it. I watched a bunch of YouTube videos I looked at a lot of GitHub accounts trying to figure out like I've got to make this move." [14:24]"It was incredibly challenging. A lot of times I was trying to figure out... where sometimes the information that you get from the client is essentially just a hint of what's going on in the network." [17:07]" You just have to be creative and keep going at it until you can do what needs to be done." [18:08]"Yeah. It's amazing, and especially coming from public school teaching where I had seen almost physical fights altercations happen over like reams of paper because there's just not that much allocated towards schools to where snacks are brought in. Like it's a very different environment…" [21:22]"You did great on the test, but I want to watch you take the test." [23:06]Links:Keya OnlineEdx: https://www.edx.org/NSF Project: https://nsf2015.fosslounge.org/Intro Music: Cascadia by Trash80 - https://trash80.com/#/content/133/weeklybeats-2012-week5 (Released under Creative Commons)Outro: Cosmetic Cosmos by Verified Picasso https://www.youtube.com/channel/UCqDmyXPJdrZjwUdWLyhyQRAGetting Into Infosec:Website, Show Notes, Transcripts: https://gettingintoinfosec.comFollow Me on Twitter: https://twitter.com/coffeewithaymanSubscribe To YouTube: https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4ACheckout My Book: https://amzn.to/2HP2i25
Today's episode is a reading of an amazing written by Kyle Kennedy, president of brainbabe.org. The reading is performed by Allison, an IBM Watson personality. I also go through some recent resources discovered to help you on your journey to a Career in Infosec. BIO: Kyle F. Kennedy is a social cybersecurity expert and president of brainbabe.org. His organization provides foundational soft-skills training for a small fee (supported by corporation donations) and plans to launch soft-skill Masterclasses in 2019.They helped organize an event called Day of Shecurity, for women of diverse backgrounds to have one day of learning: tech/ hard skills, soft skills. They had opportunities for mentorship and guidance. Day of Shecurity was FREE to attendees! Links: Article: Stories, not resumes: Breaking educational and other barriers in cybersecurity Google Image Search for "cybersecurity" Associate of (ISC)² Adrian Kaylor's talk "Sales Engineering and getting into infosec" https://www.joesecurity.org/ Flaws2 City College of SF Cybersecurity Program CCSF Information Security (Cybersecurity) Analyst Apprenticeship Sam Bowne's Classes Article in IBM Watson's Expressive SSML used on the show Intro/Outro Music: Cascadia by Trash80 Full Text of Article: When you search for images under the key word “cybersecurity,” a familiar shot always turns up: a guy wearing a hoodie, operating in a dark room, fingers on a keyboard. I’d like to replace that image with…anything. To be a cybersecurity professional, you can be anything. And anyone. We’ve heard the statistics. There is currently a human capital crisis, with 1.5 million cybersecurity jobs available and no takers. The number is projected to balloon to 3.2 million by 2021. But who exactly are these cybersecurity professionals we are looking for? For so long, we have had our own definition of who can fit that talent. A good cybersecurity professional has to have a computer science degree. They must have solid professional background. They have to be male. This pattern of defining success has led us to the shortage we are experiencing today. It’s kind of like insanity, really: Doing the same thing over and over and expecting different results. What really makes up a good professional? Every human being brings a different experience. You need critical thinking and creative thinking, both. A variety of educational, ethnic, geographical, backgrounds. For example, cybersecurity is not the obvious career path for someone with a biology degree; however, a biology major might help throw a new perspective on cybersecurity given that advancements of technology will eventually interface with the human body organically creating a scary threat landscape. Often too we talk about cybersecurity in the context of oil and gas, or transport, or finance. Cybersecurity today and going forward, is a horizontal across every industry, as opposed to just being by itself. Every industry needs cybersecurity professionals. People from other disciplines could provide their own perspectives and add value to how the job is done. For example, some of the best cybersecurity communicators otherwise known as “Social Engineers”, I know are drama majors, communication majors and liberal arts majors. Why are soft skills critical? The risks here are complex. If these risks are not articulated in a business language, such that executives are not able to grasp their importance, then what you will have as a result are cyber policies, created from the ivory tower, which everyone must follow, and which would inhibit the business instead of enabling it. If cybersecurity becomes more inclusive instead of exclusive, then we will be all the more superior to the attackers. As it is, it’s the enemy who are inclusive. They don’t have any requirement that hackers should have this or that degree or should have attended an Ivy League school. Most hackers are self-taught, and when something sparks their interest, they go online. They read. Nobody tells them they could not do it because they are not a good fit. Initial strides Foremost, before anything can be done, there must be an acknowledgment of the current situation and the need to be more welcoming. Business leaders and decision-makers must recognize the unconscious bias that they have. They have to understand that creating positive disruption and changing patterns are a business differentiator. My organization is active in our advocacy for inclusion in cybersecurity, specifically for women. We have been speaking to organizations on positive disruption. A good way to create action is through regional events and grassroots involvement. We bring the community together, and it is these communities that conduct classes and organize meet-ups and training courses. We did this in reaction to the more established cybersecurity conferences that present numerous barriers to entry, and which are more for senior professionals. Women may not have the luxury of being able to spring for the travel, or leave their homes for days at a time, and perhaps find childcare for the time they are away. ISC2 also now has an associate certification, where an individual can take the certification examination without the work experience; providing an opportunity for employers to recognize & support candidates entering or transitioning to the cybersecurity industry. Personal reasons My passion for diversity in cybersecurity is driven by several things. First, given my degree in sociology, I must have had a hundred interviews before landing on a job in technology, even though I knew a lot about it – it had been a hobby for years — and it was clear I was keenly interested and willing to learn. They said I was not the right fit because I did not have a technology degree; specifically, a computer science degree. Didn’t matter that I could code in Assembler, BASIC, C, Cobol, Comal, Forth, Fortran, Logo, Pascal, PL/1 or Algol. And I thought, if this could happen to me, a white male, think of all the others who could not break the barriers! I ended up leading the engineering department of the first company that hired me. And then I met my wife, who herself had to break barriers in IT because she was a woman. For example, during meetings, she was seen as more of an assistant rather than a peer, even though she was very technical. My male colleagues initially said I was just on the bandwagon with my advocacy for women in cybersecurity. I said no. Men have to recognize that we have to be part of the solution, since many of the positions of senior leadership are occupied by men. ‘This is not my coffee’ I have a good analogy for all this. Suppose you went to a Starbucks, and when your coffee is given to you, you see that it was not what you asked for. For a moment you might think you might as well take it, because the barista probably knows what is good for you, more than you do. But no – you renegotiate. The barista does not know any better. You then look for the manager to explain the mistake and to get the drink you want. Empathy is what can truly enable us to understand that we need to change the status quo. Yes, I am male, I am white, but I know that my background is a lot different from that of my peers. Because of this, I am very empathetic in that I know there are institutionalized barriers. I should know – I have spent the past 25 years in security. What should really matter is that there are many talented individuals capable of both critical and creative thinking. They may not come in the shape and size we have traditionally expected them to be, but they are interested. They are intelligent. In the end, only three questions should matter to organizations when they decide on investing in somebody for a cybersecurity role: Do you have the brain? Are you passionate? Can you learn? Kyle F. Kennedy is a social cybersecurity expert and president of brainbabe.org. His organization provides foundational soft-skills training for a small fee (supported by corporation donations) and plans to launch soft-skill Masterclasses in 2019.They helped organize an event called Day of Shecurity, for women of diverse backgrounds to have one day of learning: tech/ hard skills, soft skills. They had opportunities for mentorship and guidance. Day of Shecurity was FREE to attendees!
Show Notes: https://thugcrowd.com/notes/20181113.html
Show Notes: https://thugcrowd.com/notes/20181113.html
Christina Hanson is a security analyst working for Truvantis Cyber Security Consulting and one of my former boot camp students. She has extensive technical experience and a deep understanding of the collaborative nature of InfoSec, not to mention how women and other underrepresented groups in the community have a more difficult time navigating this industry due to institutional barriers. In our discussion, Christina touches on the wide variety of resources and events that helped her enter information security, why teamwork is just as important as technical work, and why InfoSec's responsibilities will continue to grow in the near future. Episode Highlights: How Christina's aptitude for IT led her down the path to InfoSec. The "elective" course Christina took that turned out to be career-changing. Why cooperation and group work are so important in InfoSec. The "soft skills" needed to work in security. Infosec was not her 1st or 2nd career! An overview of Christina's day at Truvantis and how she works with clients. Christina's experience at a SANS women's academy and the Day of Shecurity conference. Why the InfoSec industry needs contributions from people from all backgrounds and how it benefits from diversity in general. The increasing accessibility of conferences and other tech events for those who can't attend. InfoSec's important role as companies have more and more access to users' data. Quotes: "I found that just the general atmosphere of security and the overall focus of what you're trying to accomplish was really helpful." "Anything you're gonna do in security, you're gonna do as a team." "Being open to learning new things is really important with this particular field." "Even if I don't understand everything they're talking about, it gives me at least a start and a basic understanding that I can then research later." "Being a professional in this field, it's so important that we are able to make other people safe." Links: Christina's LinkedIn: https://www.linkedin.com/in/christinahanson461/ Day of Shecurity: https://www.dayofshecurity.com/ SANS Women's Academy: https://www.sans.org/cyb Merritt College: http://www.merritt.edu/ Dr. Johannes Ullrich: https://twitter.com/johullrich SANS Daily Podcast: https://isc.sans.edu/podcast.html The Cyberwire Podcasts: https://isc.sans.edu/podcast.html OWASP: https://www.owasp.org Amanda Rousseau (@malwareunicorn): https://twitter.com/malwareunicorn Dead Drop SF: https://www.meetup.com/Dead-Drop-SF/
Women & Minorities in Technology (WITH SHANA BUMPAS) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 21 GUEST: Shana Bumpas October 3, 2016 If you enjoy this podcast, be sure to give us a 5 ...
Long time listeners will remember Ms. Cheryl #Biswas as one of the triumvirate we had on to discuss #mainframes and mainframe #security. (http://traffic.libsyn.com/brakeingsecurity/2016-008-mainframe_secruity.mp3) I was interested in the goings on at BlackHat/DefCon/BsidesLV, and heard about #TiaraCon (@tiarac0n on Twitter). I went to find someone involved to understand what it was all about, and Ms. Cheryl reached out. She's an #organizer and was more than happy to sit down with me to understand why it was started. This is its inaugural year, and they already have some excellent schwag and sponsors. This is not just an event for ladies, but a way of #empowering #women, creating #mentorship opportunities, and assistance for people moving into the #infosec industry. Also, since Ms. Cheryl's loves discussing #ICS and #SCADA problems and headaches, we got into the headaches, #challenges, and maybe some 'logical' solutions to fixing SCADA vulns... but does the logical approach work in a business sense? TiaraCon official site: http://tiaracon.org/ TiaraCon Dates: Thursday Aug 4 - Friday Aug 5 Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-028-Cheryl_Biswas_Tiaracon_ICSSCADA_headaches.mp3 iTunes: https://itunes.apple.com/us/podcast/2016-028-cheryl-biswas-discusses/id799131292?i=1000372642921&mt=2 Youtube: https://www.youtube.com/watch?v=vsolDjsz5M4 SoundCloud: https://www.soundcloud.com/bryan-brake Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security #Podcast on #Patreon: https://www.patreon.com/bds_podcast #Twitter: @brakesec @boettcherpwned @bryanbrake #Facebook: https://www.facebook.com/BrakeingDownSec/ #Tumblr: http://brakeingdownsecurity.tumblr.com/ #Player.FM : https://player.fm/series/brakeing-down-security-podcast #Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr #TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582