Hi [[ session.user.profile.firstName ]]

Find Your Voice, Increase Your Influence

See yourself as an influencer? Desire to further your influence? We bring unique experiences, perspectives and talent to our organizations, and we want to be heard! This session will explore influencing styles and ways to effectively adapt your influencing style while being authentic.
Live online Nov 16 7:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Samara Moore and Jodi Scrofani (AWS)
Presentation preview: Find Your Voice, Increase Your Influence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cybersecurity: An IT Challenge or a Boardroom Priority? Nov 18 2021 7:00 pm UTC 60 mins
    Rob Rashotte (Fortinet)
    This webinar is designed to provide an understanding of the need to treat cybersecurity as a business-critical priority. Rather than examining the technical details of cyber-attacks and security solutions, this webinar looks at potential risks such as impacts to company valuation and earnings, disruption of M&A activities, tarnishing of brand image, and others.
  • Find Your Voice, Increase Your Influence Nov 16 2021 7:00 pm UTC 60 mins
    Samara Moore and Jodi Scrofani (AWS)
    See yourself as an influencer? Desire to further your influence? We bring unique experiences, perspectives and talent to our organizations, and we want to be heard! This session will explore influencing styles and ways to effectively adapt your influencing style while being authentic.
  • Using the Cyber Table Top (CTT) Process to Perform a Cyber Risk Assessment Nov 3 2021 6:00 pm UTC 60 mins
    Katie Premore (Lockheed Martin)
    The Cyber Table Top (CTT) process was developed in 2014 to support DoD customers who were overwhelmed by the sheer number of findings produced by traditional cybersecurity scanning tools and checklist processes. These tools and processes identify a very large number of possible vulnerabilities for a system but didn’t provide context for which vulnerabilities might truly lead to potential mission failure. Since budgets are limited, customers need methods of focusing on the most critical vulnerabilities which present the highest risk to their systems. The CTT process is focused on producing actionable cyber vulnerability data in an approachable risk matrix format to enable teams to focus resources. CTTs bring together system developers and maintainers, system users, and expert red teams to execute a multi-day wargame that focuses on the security evaluation of threats that would deny, degrade, disrupt or destroy a system and prohibit users from accomplishing their core mission. By assessing the potential mission impact of vulnerabilities as well as their likelihood/difficulty it provides a way to understand the relative risks of various vulnerabilities and focus the remediation efforts. The CTT process has been used to support DoD system cyber security evaluations in various lifecycle stages from design through long-term maintenance. It has been used to identify and mitigate threats that later were witnessed “in the wild” and caused significant negative impacts to other systems. It has become so popular that an official DoD Guidebook and training course was developed in 2018.
  • Blaze Your Trail! Discover the Many Paths to a Career in Cybersecurity Oct 21 2021 6:00 pm UTC 60 mins
    Nazira Carlage, Aliia Sitdikova, Sarah Lackey and Lynn Simons (Salesforce)
    Hear from members of Salesforce's Women in Security group about their traditional, and nontraditional, career paths into cybersecurity. Learn how to navigate the professional security landscape and ways that Salesforce is working to increase equality and representation in the industry.
  • Passwordless Future: Why passwords Are Still Around When Nobody Likes Them Oct 20 2021 6:00 pm UTC 60 mins
    Melanie Maynes (Microsoft)
    The majority of breaches each year are caused by lost, stolen, or weak credentials, and that hasn’t changed in over a decade. Learn how cybersecurity professionals came up with a new sign-in standard and what it takes for people to shift to a passwordless experience.
  • CyberSecurity Leadership: Influence without Authority Oct 19 2021 6:00 pm UTC 60 mins
    Sarah Currey (AWS)
    Do you want to raise the bar on your team’s security culture, but you don’t hold a senior title? Want to help customers scale security at the organizational level, but they only have one security engineer? In this presentation, we will explore tangible ways that you can scale and enhance your team’s security through collaboration, automation, and escalation through technical and cultural frameworks. We will cover how individual contributors (IC) can utilize ownership and earning trust to make a positive and lasting impact on your organization’s and/or customer's security culture. Participants will leave with a sense of ownership and have a tangible understanding of how to implement security at scale and escalate appropriately.
  • Ensuring a Technology Relevant Workforce Oct 18 2021 6:00 pm UTC 60 mins
    Pam Sheary (Lockheed Martin)
    The pace of emerging technologies has increased significantly, challenging individuals to maintain knowledge of relevant skills and Business Areas to staff programs with the appropriate level of engineering skills needed for optimum performance on contract in a timely manner. Develop strategies that enable a proactive rather than reactive approach, allowing engineers and organizations to stay ahead of the curve to optimize on contract performance and be prepared for future work. Learn about different engineering shapes to determine which shape is most appropriate for you and /or your organization. Broaden your horizons and explore available options that can be used to develop a Personal Development Plan that includes learning new skills and gaining experience using these skills. Don’t miss opportunities – stay ahead of the curve!

    Pam Sheary is a Lockheed Martin Fellow with 30+ years of software and systems engineering experience in the Department of Defense (DoD) industry, including 12 years managing International software development efforts. She continues to serve as the Chief Software Engineer on very large government contracts. Pam is a recognized technical leader within Agile / DevSecOps, Quantitative Management, and Risk and Opportunity Management. Pam’s work to establish Enterprise-level Code Quality has been leveraged across various government agencies. Prior to joining Lockheed Martin, Pam served in various Software and Systems engineering roles developing and testing software embedded systems and application development tools with geographically dispersed teams. Pam earned a bachelor’s degree in Computer Science & Mathematics from the University of Pittsburgh with continued graduate studies in Computer Engineering and Web Design /Accessibility. She holds several certifications, including the Scaled Agile Framework (SAFe®) and SAFe® for Government.
  • “2021’s Top 10 Privacy Tips to Protect your Privacy” Recorded: Oct 12 2021 53 mins
    Veronica Toscano (Cisco)
    Do you ever feel like someone is watching you? Do you sense someone is monitoring your every "like" or "dislike?" Do you suspect someone is listening to your conversation? Join in to learn how to increase your online privacy and insights into your privacy rights.
  • No Silver Bullet – Essence and Accident in Cyber Resiliency Engineering Recorded: Sep 14 2021 57 mins
    Teresa Merklin
    Cybersecurity incidents and failures impact critical public infrastructure, national defense, corporate economic interests, and personal privacy. As the magnitude and frequency of cyber events continues to escalate, vendors and agencies are desperately seeking solutions to solve this issue once and for all. In the 1980’s the software development industry was facing similar challenges. That crisis prompted Frederick Brooks to write his iconic paper “No Silver Bullet – Essence and Accident in Software Engineering.” The solutions and technologies detailed in that paper are eerily similar to the “breakthrough” solutions currently proposed for cyber. This presentation examines the “Silver Bullets” of cybersecurity, lessons we can learn from that parallel history, and the essence of challenges that confront modern security practitioners.

    Teresa Merklin is a Fellow at Lockheed Martin where she specializes in Cyber Risk Assessment and Engineering for Cyber Resiliency. She is currently attached to the Aeronautics Cyber Range which performs cyber assessment and penetration testing across the complete portfolio of Lockheed Martin aircraft and related systems. She has 30+ years of career experience starting out in embedded software development which slowly morphed into cybersecurity over time. Teresa holds a BSEE from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, and an MBA from the University of Dallas. She holds the CISSP and CSSLP certifications.
  • 5G and Cyber Threats Recorded: Aug 24 2021 51 mins
    Katie Grzywacz
    5G brings the power to connect billions of new devices and enable their use in new ways. With that comes significant risk. What types of threats does 5G introduce and what should we consider as we start incorporating 5G into our products?

    Katie Grzywacz is a Lockheed Martin Associate Fellow and is the chief cyber architect for the LM Space Centers of Excellence. She has 16+ years of experience that includes security engineering and offensive security testing. She is currently researching cyber threat scenarios that apply to a multitude of 5G use cases.
  • Develop Cyber Genius with the Cyber Aptitude and Talent Assessment Recorded: Aug 4 2021 59 mins
    Doug Britton, Amy Cappellanti-Wolf & Dr. Mike Bunting
    Please join us in a panel discussion as we explore the challenges surrounding talent development in the cybersecurity industry from professional development, to recruiting, hiring, and building high-performing teams. Cyber Aptitude and Talent Assessment (CATA) identifies the cognitive overlap between aspiring individuals and master practitioners. Identifying that overlap allows for powerful predictions about future success in a variety of cybersec positions such as offensive, defensive, analytical/forensic, or design/development positions.

    You'll leave this talk with a deeper understanding of the scientific rigor that validates and sets the CATA tool apart, how CATA helps the individual cybersec professional (and anyone wishing to become a cyber sec pro) align their career decisions with their innate cyber aptitude, how human resource managers can streamline their talent pipeline, eliminate noise, and find the best possible candidates for their org, and how hiring managers can use CATA to cognitively fingerprint their highest performing teams and develop a talent mapping and succession plan.
  • How to WOW Submission Reviewers with a Stellar Proposal Recorded: Jun 9 2021 61 mins
    Diana Kelley, Alyssa Miller, Chloe Messdaghi, Tennisha Martin
    So you want to showcase your skills and speak at a technical conference? Great. Your voice matters. Conference organizers highly value new voices, and they are always on the lookout for ways to bring more talent to the stage. The good news is that there are opportunities abound and by submitting to conferences, you're honing in on your expertise, experience and knowledge, creating the most stellar of proposals. Join us for an honest discussion of cybersecurity industry influencers who weren't always used to being accepted when they initially submitted for speaking opportunities. They will share their stories of how they transformed every "no" into a "YES"!
  • A Day in the life of SOC: Woman’s Perspective Recorded: Jun 3 2021 70 mins
    Amina Aggarwal (Workday)
    A security operations center (SOC) is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended by a team of information security professionals.

    This session will give you insight of a SOC from a woman's perspective. You will be taken through some of the challenges faced by many of us today while working in a male dominated field. By the end of this webinar, you will have learned about the day-to-day activities in a SOC, how to manage your work-life balance, and how to acquire the skills that will help you grow in this field.
  • WiCyS Veterans' Apprenticeship Program Recorded: Apr 20 2021 60 mins
    Smoothstack Team
    WiCyS brings together women and supporters from around the world to develop cybersecurity skills with the aim of advancing women in, building equity in and developing minority talent in the field. One of WiCyS’s focuses is bridging the cybersecurity skills gap for female veterans, which is what helped launch the Veterans’ Program. Military career experience aligns well with a job in cybersecurity.

    The WiCyS Veterans’ Apprenticeship Program includes paid training and apprenticeship, secure long-term employment, and a litany of possible resources including access to technology and mentoring. This innovative apprenticeship model is DOL-certified and a top-notch gateway to get the support needed to enter into thriving cybersecurity careers. Join this webinar to learn more about the WiCyS Veterans' Apprenticeship Program and see if it's the right fit for YOU! And, as always... we thank you for your service.
  • Digitally Evolving Credit Unions: A Business Case for Evolving Member Experience Recorded: Apr 14 2021 42 mins
    Elizabeth Kaspern, SVP at TruMark Financial Credit Union, Jay Levin, CRO at Relay Network & Karen Diamond, pureIntegration
    Today’s credit union members expect a consistent, personalized experience—no matter how or where they interact with you: in person, by telephone, through a smartphone application, or on your website. Join us to hear from industry leaders who will break down what it really means to evolve the member experience, how to plan your member’s digital journey, and how small changes make a big difference.
  • WiCyS Veterans' Apprenticeship Program Recorded: Apr 8 2021 72 mins
    Smoothstack Team
    WiCyS brings together women and supporters from around the world to develop cybersecurity skills with the aim of advancing women in, building equity in and developing minority talent in the field. One of WiCyS’s focuses is bridging the cybersecurity skills gap for female veterans, which is what helped launch the Veterans’ Program. Military career experience aligns well with a job in cybersecurity.

    The WiCyS Veterans’ Apprenticeship Program includes paid training and apprenticeship, secure long-term employment, and a litany of possible resources including access to technology and mentoring. This innovative apprenticeship model is DOL-certified and a top-notch gateway to get the support needed to enter into thriving cybersecurity careers. Join this webinar to learn more about the WiCyS Veterans' Apprenticeship Program and see if it's the right fit for YOU! And, as always... we thank you for your service.
  • Digitally Evolving Credit Unions: A Business Case for Automation Recorded: Mar 25 2021 28 mins
    Ashwin Krishnamurthi, Large credit union and Karen Diamond, pureIntegration
    Credit unions that seek digital solutions to improve overall operating efficiency and member satisfaction will hear how a large credit union successfully implemented process automation to achieve significant business goals. We will discuss the lessons learned, as well as best and worst decisions made along the way. Join Ashwin Krishnamurthi, a Process and Automation Expert at a large credit union and Karen Diamond, VP of Enterprise Accounts at pureIntegration for this fascinating discussion.
  • Design a Mentoring Program That Delivers! Recorded: Mar 23 2021 59 mins
    Sushila Nair, Joy Harrison, Kwasi Mitchell, and Hollee Mangrum-Willis
    Mentoring programs can increase knowledge and build skills for future goals and milestones, allowing your workforce to grow their skills organically and create cultures of collaboration and success.

    Join Part 1 of our series to learn how to design a mentoring program for women and minorities in security that actually delivers for everyone involved.
    - Learn from experts on how to design a mentoring program that delivers
    - Understand how to make mentoring meaningful for your organization
    - Learn what strategic planning steps are critical to make the plan a success

    Speakers:
    - Virginia "Ginger" Spitzer, Executive Director | ISACA, One In Tech Foundation
    - Joy Harrison, Director, Leadership Development Center for Excellence | NTT DATA Services
    - Sushila Nair, VP Security Services, Chief Digital Officer | NTT DATA Services
    - Kwasi Mitchell, Chief Purpose Officer | Deloitte
    This is Part 1 of our new series on mentorship produced by BrightTALK. Sign up for Part 2 via the link in the attachments.
  • Cybersecurity Scholarships Through Cyber FastTrack Recorded: Mar 18 2021 26 mins
    Haya Arfat
    Come learn about Cyber FastTrack, an opportunity to earn scholarships and accelerate your career in cybersecurity, and gain access to free training materials.
  • SentinelOne's Woman Leaders: Top Insights that Have Guided their Careers Recorded: Mar 17 2021 61 mins
    SentinelOne Team
    Join SentinelOne's woman sales leaders as they share their top insights that have guided their business careers!
Rising above the challenges to do amazing things in tech
Women make up only 37% of the tech workforce at entry level, and this percentage drops with each incremental advance in their careers. This series will outline the current state of the tech industry, the challenges women are facing in hi-tech careers, as well as shed light on the opportunities that are opening up for women in tech.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Find Your Voice, Increase Your Influence
  • Live at: Nov 16 2021 7:00 pm
  • Presented by: Samara Moore and Jodi Scrofani (AWS)
  • From:
Your email has been sent.
or close