Hi [[ session.user.profile.firstName ]]

CyberSecurity Leadership: Influence without Authority

Do you want to raise the bar on your team’s security culture, but you don’t hold a senior title? Want to help customers scale security at the organizational level, but they only have one security engineer? In this presentation, we will explore tangible ways that you can scale and enhance your team’s security through collaboration, automation, and escalation through technical and cultural frameworks. We will cover how individual contributors (IC) can utilize ownership and earning trust to make a positive and lasting impact on your organization’s and/or customer's security culture. Participants will leave with a sense of ownership and have a tangible understanding of how to implement security at scale and escalate appropriately.
Recorded Oct 19 2021 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sarah Currey (AWS)
Presentation preview: CyberSecurity Leadership: Influence without Authority

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The IT Factor: What You Need Besides Technical Skills to Succeed Dec 16 2021 7:00 pm UTC 60 mins
    Sarah Davenport and Egxona Ferati
    Technical skills aren’t the only thing you need to get ahead in tech. Join this webinar with WiCyS Strategic Partner, Facebook, as they provide attendees with practical communication tools and soft skills to increase individual impact and complement rockstar technical prowess.
  • Implementing a Security Risk Program in the Cloud using AWS Services Dec 9 2021 7:00 pm UTC 60 mins
    Lewa Owolabi and Kristine Harper
    Deep dive into the AWS security and governance services that can be leveraged to implement any risk management framework with Senior Consultants from AWS Security Assurance Services (AWS SAS). Learn the specific AWS services to configure and automate how you identify security vulnerabilities, assess risk, respond, remediate and track your risks as part of your overall risk management program.
  • Hunting for a Career in Cybersecurity - Lessons from the Microsoft Team Dec 7 2021 7:00 pm UTC 60 mins
    Elda Tan Seng and Kate Livingston (Microsoft)
    The life of a cybersecurity incident responder is challenging and rewarding – but managing it at the beginning of your career can be a little overwhelming at times. Please join the Director of the Microsoft Detection and Response Team (DART), Elda Tan Seng, and Senior Cybersecurity Consultant, Kate Livingston, to learn about the exciting and fast-paced world of incident response and threat hunting at Microsoft and what it’s like to be an incident responder at the beginning of your career.
  • Cybersecurity: An IT Challenge or a Boardroom Priority? Recorded: Nov 18 2021 62 mins
    Rob Rashotte (Fortinet)
    Join us on November 18th to learn how to avoid sophisticated targeted attacks that could cripple your business and inflict physical damage to your critical infrastructure. Using real-world examples of well-known organizations who have felt the significant business impacts from a cyberattack, this webinar will teach you:

    When to treat cyber threat as part of your overall enterprise risk strategy.
    Which cybersecurity framework best suits your organization.
    How to develop a cybersecurity training and education plan.
  • Find Your Voice, Increase Your Influence Recorded: Nov 16 2021 58 mins
    Samara Moore and Jodi Scrofani (AWS)
    See yourself as an influencer? Desire to further your influence? We bring unique experiences, perspectives and talent to our organizations, and we want to be heard! This session will explore influencing styles and ways to effectively adapt your influencing style while being authentic.
  • The Importance of Male Allies Recorded: Nov 9 2021 56 mins
    Pam Lindemoen, Stephen Jones, and Daniel DeSantis (Cisco)
    It is Cisco’s purpose to power an inclusive future for all. This begins in the workplace with a culture that fosters diversity and inclusion. Join us on November 09, 2021, to hear about the role of male allies in helping to foster an environment of diversity and inclusion.
  • Using the Cyber Table Top (CTT) Process to Perform a Cyber Risk Assessment Recorded: Nov 3 2021 61 mins
    Katie Premore (Lockheed Martin)
    The Cyber Table Top (CTT) process was developed in 2014 to support DoD customers who were overwhelmed by the sheer number of findings produced by traditional cybersecurity scanning tools and checklist processes. These tools and processes identify a very large number of possible vulnerabilities for a system but didn’t provide context for which vulnerabilities might truly lead to potential mission failure. Since budgets are limited, customers need methods of focusing on the most critical vulnerabilities which present the highest risk to their systems. The CTT process is focused on producing actionable cyber vulnerability data in an approachable risk matrix format to enable teams to focus resources. CTTs bring together system developers and maintainers, system users, and expert red teams to execute a multi-day wargame that focuses on the security evaluation of threats that would deny, degrade, disrupt or destroy a system and prohibit users from accomplishing their core mission. By assessing the potential mission impact of vulnerabilities as well as their likelihood/difficulty it provides a way to understand the relative risks of various vulnerabilities and focus the remediation efforts. The CTT process has been used to support DoD system cyber security evaluations in various lifecycle stages from design through long-term maintenance. It has been used to identify and mitigate threats that later were witnessed “in the wild” and caused significant negative impacts to other systems. It has become so popular that an official DoD Guidebook and training course was developed in 2018.
  • Blaze Your Trail! Discover the Many Paths to a Career in Cybersecurity Recorded: Oct 21 2021 59 mins
    Nazira Carlage, Aliia Sitdikova, Sarah Lackey and Lynn Simons (Salesforce)
    Hear from members of Salesforce's Women in Security group about their traditional, and nontraditional, career paths into cybersecurity. Learn how to navigate the professional security landscape and ways that Salesforce is working to increase equality and representation in the industry.
  • Passwordless Future: Why passwords Are Still Around When Nobody Likes Them Recorded: Oct 20 2021 56 mins
    Melanie Maynes (Microsoft)
    The majority of breaches each year are caused by lost, stolen, or weak credentials, and that hasn’t changed in over a decade. Learn how cybersecurity professionals came up with a new sign-in standard and what it takes for people to shift to a passwordless experience.
  • CyberSecurity Leadership: Influence without Authority Recorded: Oct 19 2021 58 mins
    Sarah Currey (AWS)
    Do you want to raise the bar on your team’s security culture, but you don’t hold a senior title? Want to help customers scale security at the organizational level, but they only have one security engineer? In this presentation, we will explore tangible ways that you can scale and enhance your team’s security through collaboration, automation, and escalation through technical and cultural frameworks. We will cover how individual contributors (IC) can utilize ownership and earning trust to make a positive and lasting impact on your organization’s and/or customer's security culture. Participants will leave with a sense of ownership and have a tangible understanding of how to implement security at scale and escalate appropriately.
  • Ensuring a Technology Relevant Workforce Recorded: Oct 18 2021 56 mins
    Pam Sheary (Lockheed Martin)
    The pace of emerging technologies has increased significantly, challenging individuals to maintain knowledge of relevant skills and Business Areas to staff programs with the appropriate level of engineering skills needed for optimum performance on contract in a timely manner. Develop strategies that enable a proactive rather than reactive approach, allowing engineers and organizations to stay ahead of the curve to optimize on contract performance and be prepared for future work. Learn about different engineering shapes to determine which shape is most appropriate for you and /or your organization. Broaden your horizons and explore available options that can be used to develop a Personal Development Plan that includes learning new skills and gaining experience using these skills. Don’t miss opportunities – stay ahead of the curve!

    Pam Sheary is a Lockheed Martin Fellow with 30+ years of software and systems engineering experience in the Department of Defense (DoD) industry, including 12 years managing International software development efforts. She continues to serve as the Chief Software Engineer on very large government contracts. Pam is a recognized technical leader within Agile / DevSecOps, Quantitative Management, and Risk and Opportunity Management. Pam’s work to establish Enterprise-level Code Quality has been leveraged across various government agencies. Prior to joining Lockheed Martin, Pam served in various Software and Systems engineering roles developing and testing software embedded systems and application development tools with geographically dispersed teams. Pam earned a bachelor’s degree in Computer Science & Mathematics from the University of Pittsburgh with continued graduate studies in Computer Engineering and Web Design /Accessibility. She holds several certifications, including the Scaled Agile Framework (SAFe®) and SAFe® for Government.
  • “2021’s Top 10 Privacy Tips to Protect your Privacy” Recorded: Oct 12 2021 53 mins
    Veronica Toscano (Cisco)
    Do you ever feel like someone is watching you? Do you sense someone is monitoring your every "like" or "dislike?" Do you suspect someone is listening to your conversation? Join in to learn how to increase your online privacy and insights into your privacy rights.
  • No Silver Bullet – Essence and Accident in Cyber Resiliency Engineering Recorded: Sep 14 2021 57 mins
    Teresa Merklin
    Cybersecurity incidents and failures impact critical public infrastructure, national defense, corporate economic interests, and personal privacy. As the magnitude and frequency of cyber events continues to escalate, vendors and agencies are desperately seeking solutions to solve this issue once and for all. In the 1980’s the software development industry was facing similar challenges. That crisis prompted Frederick Brooks to write his iconic paper “No Silver Bullet – Essence and Accident in Software Engineering.” The solutions and technologies detailed in that paper are eerily similar to the “breakthrough” solutions currently proposed for cyber. This presentation examines the “Silver Bullets” of cybersecurity, lessons we can learn from that parallel history, and the essence of challenges that confront modern security practitioners.

    Teresa Merklin is a Fellow at Lockheed Martin where she specializes in Cyber Risk Assessment and Engineering for Cyber Resiliency. She is currently attached to the Aeronautics Cyber Range which performs cyber assessment and penetration testing across the complete portfolio of Lockheed Martin aircraft and related systems. She has 30+ years of career experience starting out in embedded software development which slowly morphed into cybersecurity over time. Teresa holds a BSEE from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, and an MBA from the University of Dallas. She holds the CISSP and CSSLP certifications.
  • 5G and Cyber Threats Recorded: Aug 24 2021 51 mins
    Katie Grzywacz
    5G brings the power to connect billions of new devices and enable their use in new ways. With that comes significant risk. What types of threats does 5G introduce and what should we consider as we start incorporating 5G into our products?

    Katie Grzywacz is a Lockheed Martin Associate Fellow and is the chief cyber architect for the LM Space Centers of Excellence. She has 16+ years of experience that includes security engineering and offensive security testing. She is currently researching cyber threat scenarios that apply to a multitude of 5G use cases.
  • Develop Cyber Genius with the Cyber Aptitude and Talent Assessment Recorded: Aug 4 2021 59 mins
    Doug Britton, Amy Cappellanti-Wolf & Dr. Mike Bunting
    Please join us in a panel discussion as we explore the challenges surrounding talent development in the cybersecurity industry from professional development, to recruiting, hiring, and building high-performing teams. Cyber Aptitude and Talent Assessment (CATA) identifies the cognitive overlap between aspiring individuals and master practitioners. Identifying that overlap allows for powerful predictions about future success in a variety of cybersec positions such as offensive, defensive, analytical/forensic, or design/development positions.

    You'll leave this talk with a deeper understanding of the scientific rigor that validates and sets the CATA tool apart, how CATA helps the individual cybersec professional (and anyone wishing to become a cyber sec pro) align their career decisions with their innate cyber aptitude, how human resource managers can streamline their talent pipeline, eliminate noise, and find the best possible candidates for their org, and how hiring managers can use CATA to cognitively fingerprint their highest performing teams and develop a talent mapping and succession plan.
  • How to WOW Submission Reviewers with a Stellar Proposal Recorded: Jun 9 2021 61 mins
    Diana Kelley, Alyssa Miller, Chloe Messdaghi, Tennisha Martin
    So you want to showcase your skills and speak at a technical conference? Great. Your voice matters. Conference organizers highly value new voices, and they are always on the lookout for ways to bring more talent to the stage. The good news is that there are opportunities abound and by submitting to conferences, you're honing in on your expertise, experience and knowledge, creating the most stellar of proposals. Join us for an honest discussion of cybersecurity industry influencers who weren't always used to being accepted when they initially submitted for speaking opportunities. They will share their stories of how they transformed every "no" into a "YES"!
  • A Day in the life of SOC: Woman’s Perspective Recorded: Jun 3 2021 70 mins
    Amina Aggarwal (Workday)
    A security operations center (SOC) is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended by a team of information security professionals.

    This session will give you insight of a SOC from a woman's perspective. You will be taken through some of the challenges faced by many of us today while working in a male dominated field. By the end of this webinar, you will have learned about the day-to-day activities in a SOC, how to manage your work-life balance, and how to acquire the skills that will help you grow in this field.
  • WiCyS Veterans' Apprenticeship Program Recorded: Apr 20 2021 60 mins
    Smoothstack Team
    WiCyS brings together women and supporters from around the world to develop cybersecurity skills with the aim of advancing women in, building equity in and developing minority talent in the field. One of WiCyS’s focuses is bridging the cybersecurity skills gap for female veterans, which is what helped launch the Veterans’ Program. Military career experience aligns well with a job in cybersecurity.

    The WiCyS Veterans’ Apprenticeship Program includes paid training and apprenticeship, secure long-term employment, and a litany of possible resources including access to technology and mentoring. This innovative apprenticeship model is DOL-certified and a top-notch gateway to get the support needed to enter into thriving cybersecurity careers. Join this webinar to learn more about the WiCyS Veterans' Apprenticeship Program and see if it's the right fit for YOU! And, as always... we thank you for your service.
  • Digitally Evolving Credit Unions: A Business Case for Evolving Member Experience Recorded: Apr 14 2021 42 mins
    Elizabeth Kaspern, SVP at TruMark Financial Credit Union, Jay Levin, CRO at Relay Network & Karen Diamond, pureIntegration
    Today’s credit union members expect a consistent, personalized experience—no matter how or where they interact with you: in person, by telephone, through a smartphone application, or on your website. Join us to hear from industry leaders who will break down what it really means to evolve the member experience, how to plan your member’s digital journey, and how small changes make a big difference.
  • WiCyS Veterans' Apprenticeship Program Recorded: Apr 8 2021 72 mins
    Smoothstack Team
    WiCyS brings together women and supporters from around the world to develop cybersecurity skills with the aim of advancing women in, building equity in and developing minority talent in the field. One of WiCyS’s focuses is bridging the cybersecurity skills gap for female veterans, which is what helped launch the Veterans’ Program. Military career experience aligns well with a job in cybersecurity.

    The WiCyS Veterans’ Apprenticeship Program includes paid training and apprenticeship, secure long-term employment, and a litany of possible resources including access to technology and mentoring. This innovative apprenticeship model is DOL-certified and a top-notch gateway to get the support needed to enter into thriving cybersecurity careers. Join this webinar to learn more about the WiCyS Veterans' Apprenticeship Program and see if it's the right fit for YOU! And, as always... we thank you for your service.
Rising above the challenges to do amazing things in tech
Women make up only 37% of the tech workforce at entry level, and this percentage drops with each incremental advance in their careers. This series will outline the current state of the tech industry, the challenges women are facing in hi-tech careers, as well as shed light on the opportunities that are opening up for women in tech.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CyberSecurity Leadership: Influence without Authority
  • Live at: Oct 19 2021 6:00 pm
  • Presented by: Sarah Currey (AWS)
  • From:
Your email has been sent.
or close