Hi [[ session.user.profile.firstName ]]

Women's Society of Cyberjutsu

  • Date
  • Rating
  • Views
  • What Your Security Team Needs to Know about GDPR
    What Your Security Team Needs to Know about GDPR Richard Stiennon from IT-Harvest & Interfocus Technologies Recorded: Sep 12 2018 41 mins
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
  • A Deep Dive into the 2018 State of IoT Security Report
    A Deep Dive into the 2018 State of IoT Security Report Vince Crisler, CEO of Dark Cubed Recorded: Sep 12 2018 33 mins
    Dark Cubed conducted extensive testing and determined that many IoT “smart home” device manufacturers have failed to implement basic security protections in the design, development, and production of their products such as electrical plugs, light bulbs and security cameras.

    Join CEO Vince Crisler for a live webcast as he discusses:

    · The creation and operation of the closed testing environment to simulate smart devices in a real-world home

    · The integration of Dark Cubed’s platform to capture and examine traffic patterns and message contents between each device, its back-end infrastructure and its Android app

    · Detailed port communications profiles, Nmap scan findings, infrastructure port reviews, man-in-the-middle assessments, Android app permissions and profiles, and privacy policy reviews for these light bulbs, cameras, and electrical outlets

    Learn more here: www.thestateofiotsecurity.com
  • Career Conversations w/ Cyberjutsu Girls Academy Leadership Team
    Career Conversations w/ Cyberjutsu Girls Academy Leadership Team Jessica Gulick, MBA | PMP | CISSP Recorded: Aug 23 2018 48 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:
    Katie Nickels - MITRE
    Kandis Weiler - MBA Candidate, Marymount University
  • Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity
    Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity Ehab Samy, VP Product Management, Plurilock Recorded: Aug 15 2018 32 mins
    Traditional security and authentication methods are designed to put up stumbling blocks for your employees, challenging them at several points throughout their workday to identify themselves. To do this they must enter, remember, and frequently change passwords, and in the expanding world of two- or multi-factor authentication the enterprise seeks greater security at the further expense of productivity. But traditional passwords and other authentication methods can be compromised, so the impact to your user processes does not always deliver proportional security.

    Artificial intelligence and biometrics can change the authentication game, supporting enhanced security by automatically identifying employee identity without impacting workflows and user processes. Join Ehab Samy, VP Product Management, to learn about applications of biometrics and Artificial Intelligence that smooth your employees’ path to completing any task at work.
  • Mark Whitehead on Cyber Threats and Improving Security
    Mark Whitehead on Cyber Threats and Improving Security Mark Whitehead (Trustwave) & Mari Galloway (Women's Society of Cyberjutsu) Recorded: Aug 8 2018 26 mins
    Join Mark Whitehead, Director, Spider Labs Americas at Trustwave for an exclusive interview at Black Hat 2018 in Las Vegas on the latest cyber threats and trends in cybersecurity. Some of the topics up for discussion will include:
    - What are the 3-5 top cyber threats CISOs are worried about in 2018? What's new on the threatscape?
    - How to improve cybersecurity? Key areas to focus on. Top recommendations for CISOs.
    - Data breaches affecting millions of users are on the rise. What are the security controls / policy changes / tech solutions businesses should implement to prevent breaches and detect them faster?
    - What are the biggest threats to security coming from the IoT? Are you worried about cyberwarfare? How should we be protecting our critical infrastructure?
    - Cybercrime is on the rise. How can businesses defend against ransomware, phishing, social engineering, and other cyber-attacks? Is investing in technology enough, or should the focus also be on cyber awareness education for employees.
    - There is chronic shortage of skilled cyber security workforce in the US and worldwide. How are businesses coping with the lack of cyber talent in the age of cyber-attacks? Is AI/ML helping alleviate the problem? How does diversity (or lack thereof) play into all of this?
    - What career path will be most advantageous to people starting their cybersecurity career?
    - Can you explain testing maturity models as it relates to test organizations conduct to test their security posture?
    - How do you properly scope testing?
    - How do you test in cloud and hybrid environments?
    - Can you explain the compliance vs security mindset?
  • Career Conversations w/ Twitter Queens Tracy and Amanda
    Career Conversations w/ Twitter Queens Tracy and Amanda Jessica Gulick, MBA | PMP | CISSP Recorded: Jul 19 2018 59 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:
    Amanda Berlin, MCITP
    Tracy Maleeff, Masters in Library and Information Science
  • Career Conversations with the WSC Board of Directors
    Career Conversations with the WSC Board of Directors WSC Board of Directors Recorded: Jun 28 2018 61 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests:
    Lisa Jiggetts, MBA | CISSP | ECSA | C|EH | SCNP | MCSE | CCNA | SCSA | Network+ | A+

    Jessica Gulick, MBA | PMP | CISSP

    Mari Galloway, MSIS | CISSP | GSEC | GMON | GCIH | GPEN | GCFE | C|EH | CCNA Security | CCNA | Security+ | IT Project+ | MOS

    Elena Steinke, MBA | CISSP | Security+ | C|EH | Threat Intelligence Analyst

    Hosted by Mansi Thakar, Associate of the Women's Society of Cyberjutsu
  • Increasing Cyber Workforce Diversity
    Increasing Cyber Workforce Diversity Max Shuftan, Jessica Gulick and other panelist Recorded: Jun 20 2018 64 mins
    Join this webinar to hear from past students and current champions discuss how the SANS CyberTalent program is changing lives and closing the workforce gap. The cybersecurity workforce gap can be partly solved through increasing diversity. Organizations like SANS CyberTalent and the WSC are reaching into communities throughout Maryland and the US searching for professionals with technical appitude but new to cybersecurity.

    These academies are designed to help qualified veterans and women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the students selected.


    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • Career Conversations w/ Kristin Demoranville; Manager of Global Policy
    Career Conversations w/ Kristin Demoranville; Manager of Global Policy Jessica Guilick Recorded: May 17 2018 61 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Kristin Demoranville is a triple threat in STEM, she holds a BS in Environmental Management, has worked in Information Technology since dial up modems were a thing, and is currently focusing on Manufacturing Security & Global Policy at Sony.
  • Gamification and Security: The Role of Competitions in Readiness and Defense
    Gamification and Security: The Role of Competitions in Readiness and Defense Lisa Jiggetts, Founder, President & CEO of the Women's Society of Cyberjutsu Recorded: Apr 26 2018 57 mins
    Security operations face intensifying pressures along numerous fronts, including a constantly shifting threat landscape, an increasingly complex environment to defend, and an extreme shortage of skills. This panel of distinguished security experts will discuss the role that competitions – at the primary school, collegiate and professional levels – can play in attracting workers to the security arena, growing their skills, and developing methods to identify and defend against the greatest threats and risks of the day.

    Lisa Jiggetts, the Founder & CEO of the Women's Society of Cyberjutsu, one of the fastest growing nonprofits dedicated to women in cybersecurity, will spearhead this panel of experts is cyber security and competitions.

    Other panelists include Mika Devonshire, Director of Forensics and Cyber Risk Analytics at SSIC; Marcelle Lee, Threat Researcher at LookingGlass Cyber Solutions; and Dan Manson, Professor of Computer Information Systems at Cal Poly Pomona.

Embed in website or blog