Hi [[ session.user.profile.firstName ]]

SANS Extends High School Girls and College Student Cyber Training Programs to 27

Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

Both programs are 100% scholarshiped for students and open for registeration in April 2019.
Recorded Mar 28 2019 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mandy Galante, SANS CyberStart Program Director
Presentation preview: SANS Extends High School Girls and College Student Cyber Training Programs to 27

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SANS Extends High School Girls and College Student Cyber Training Programs May 1 2019 4:30 pm UTC 26 mins
    Mandy Galante, SANS CyberStart Program Director
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
  • Developing Your Cyber Security Action Plan Recorded: Apr 18 2019 83 mins
    Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations
    Have you been thinking about transitioning to a career in cybersecurity, but are not quite sure how to make your dream a reality? Are you currently working a cyber job but want to make a plan for advancement? This program walks you through the steps that you need to take in order to explore your cyber career options. It gives you a structured framework for exploring your interest in cyber, researching cyber positions, learning about cyber policies and standards, learning cyber tools, obtaining cyber / IT certifications, as well as applying for cyber jobs. This approach helps you to create your own cyber career action plan so that you can position yourself to join the field of cybersecurity.

    Join Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations; & Cyberjutsu Award Winner, for an interactive discussion on building your Cyber Security Action Plan.
  • SANS Extends High School Girls and College Student Cyber Training Programs to 27 Recorded: Mar 28 2019 27 mins
    Mandy Galante, SANS CyberStart Program Director
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
  • RSAC 2019 Recap - Emerging Tech, Threats and AI Recorded: Mar 26 2019 62 mins
    Chris Roberts (Attivio Networks), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic)
    What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.

    Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
    - Top security challenges and how are we solving them
    - Biggest buzzwords: Hype vs. reality
    - Exciting new tech
    - Top conference highlights
    - Cybersecurity as a boardroom issue
    - CISO's toolbox
    - Words of wisdom for people interested in security

    This is an interactive session and the audience is encouraged to ask questions during this live webcast.
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group Recorded: Mar 21 2019 55 mins
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Recorded: Mar 13 2019 44 mins
    Brenden Bishop, Data Scientist, the Columbus Collaboratory
    Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.
  • Distinguish Signal from Noise: Find Threats in Your Security Sensor Data Recorded: Feb 27 2019 45 mins
    Slava Nikitin, Data Scientist, The Columbus Collaboratory
    Join us for this webinar that will recommend how to deal with your “big data” problem when dealing with the massive volume of raw, unprocessed data points from your network security sensors. Hint: don’t start with the data and attempt to drill down to the problem. Instead, as Slava Nitikin, Data Scientist from the Columbus Collaboratory will explain, you must start by the defining problem, building a threat model, and then focusing on the corresponding signals in your sensor data. We will walk through the use case for an Active Directory password spraying attack to demonstrate how to define and apply appropriate filters to your security data for faster detection, more accurate threat scoring and more effective security overall.
  • Survival Skills for Cybersecurity Leaders Recorded: Jan 15 2019 60 mins
    Glenn Richardson, Executive Coach, LeaderSages
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
  • Career Conversations w/ Maggie Powell, Exelon Recorded: Dec 21 2018 42 mins
    Jessica Gulick, CEO, Katzcy
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Maggy Powell , MIA, International Economic Policy, Eastern Europe

    Maggy Powell is the Senior Manager, Real Time Systems Security for Exelon. Her teams include security engineering, a security operations center and security compliance focused on real time systems across the enterprise. She is responsible for vulnerability assessment, threat management and incident response for industrial control systems and operational technology as well as compliance fulfillment for applicable CIP cyber security standards.
  • Unified Endpoint Management & Security: A Force Multiplier Recorded: Dec 13 2018 56 mins
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services Recorded: Nov 16 2018 60 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Foolproof Digital Identity with Behavioral Biometrics Recorded: Nov 15 2018 59 mins
    Ehab Samy, VP Product Management, Plurilock
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Gaining the Upper Hand on Network Vulnerabilities Recorded: Nov 8 2018 60 mins
    Nathan Vega, VP Product, Columbus Collaboratory
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • Career Conversations w/ Kristen Judge, Cybercrime Support Network Recorded: Oct 18 2018 46 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Kristin Judge, Author at LinkedIn Learning

    Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

    As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

    As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

    In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.

    To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
  • When Biometrics Simply Don't Cut It Recorded: Oct 10 2018 61 mins
    Ehab Samy, Vice President of Product Management for Plurilock
    Identifying a user through fingerprints, facial recognition or iris scanning is simply not enough for today's digital age. Join us to learn about the shift from point-in-time identification to behavioral biometrics and how it is impacting today's workforce. Ehab Samy, Vice President of Product Management for Plurilock, will explore game-changing practices in continuous authentication and identity management to control access to physical spaces, applications, and government services.
  • Career Conversations w/ Sandra Larson of Looking Glass Recorded: Oct 4 2018 42 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Sandra Larson, M.S. Applied Intelligence

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    About the Speaker:

    Sandra Larson is a Senior Director of Intelligence for LookingGlass Cyber Solutions, a cybersecurity company specializing in physical, cyber, and brand risks for small business, global enterprises and government agencies. Sandra has been with LookingGlass for almost ten years, and manages the client relationships for LookingGlass’ clientele in the food and agribusiness, pharmaceutical, retail, and technology industries. Previously, Sandra received her Master of Science in Applied Intelligence from Mercyhurst University.
  • What Your Security Team Needs to Know about GDPR Recorded: Sep 12 2018 41 mins
    Richard Stiennon from IT-Harvest & Interfocus Technologies
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
  • A Deep Dive into the 2018 State of IoT Security Report Recorded: Sep 12 2018 33 mins
    Vince Crisler, CEO of Dark Cubed
    Dark Cubed conducted extensive testing and determined that many IoT “smart home” device manufacturers have failed to implement basic security protections in the design, development, and production of their products such as electrical plugs, light bulbs and security cameras.

    Join CEO Vince Crisler for a live webcast as he discusses:

    · The creation and operation of the closed testing environment to simulate smart devices in a real-world home

    · The integration of Dark Cubed’s platform to capture and examine traffic patterns and message contents between each device, its back-end infrastructure and its Android app

    · Detailed port communications profiles, Nmap scan findings, infrastructure port reviews, man-in-the-middle assessments, Android app permissions and profiles, and privacy policy reviews for these light bulbs, cameras, and electrical outlets

    Learn more here: www.thestateofiotsecurity.com
  • Career Conversations w/ Cyberjutsu Girls Academy Leadership Team Recorded: Aug 23 2018 48 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:
    Katie Nickels - MITRE
    Kandis Weiler - MBA Candidate, Marymount University
  • Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity Recorded: Aug 15 2018 32 mins
    Ehab Samy, VP Product Management, Plurilock
    Traditional security and authentication methods are designed to put up stumbling blocks for your employees, challenging them at several points throughout their workday to identify themselves. To do this they must enter, remember, and frequently change passwords, and in the expanding world of two- or multi-factor authentication the enterprise seeks greater security at the further expense of productivity. But traditional passwords and other authentication methods can be compromised, so the impact to your user processes does not always deliver proportional security.

    Artificial intelligence and biometrics can change the authentication game, supporting enhanced security by automatically identifying employee identity without impacting workflows and user processes. Join Ehab Samy, VP Product Management, to learn about applications of biometrics and Artificial Intelligence that smooth your employees’ path to completing any task at work.
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: SANS Extends High School Girls and College Student Cyber Training Programs to 27
  • Live at: Mar 28 2019 9:30 pm
  • Presented by: Mandy Galante, SANS CyberStart Program Director
  • From:
Your email has been sent.
or close