Hi [[ session.user.profile.firstName ]]

Developing Your Cyber Security Action Plan

Have you been thinking about transitioning to a career in cybersecurity, but are not quite sure how to make your dream a reality? Are you currently working a cyber job but want to make a plan for advancement? This program walks you through the steps that you need to take in order to explore your cyber career options. It gives you a structured framework for exploring your interest in cyber, researching cyber positions, learning about cyber policies and standards, learning cyber tools, obtaining cyber / IT certifications, as well as applying for cyber jobs. This approach helps you to create your own cyber career action plan so that you can position yourself to join the field of cybersecurity.

Join Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations; & Cyberjutsu Award Winner, for an interactive discussion on building your Cyber Security Action Plan.
Recorded Apr 18 2019 83 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations
Presentation preview: Developing Your Cyber Security Action Plan

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Thrill of the Hunt: My Leap into Bug Bounties Jun 8 2019 5:00 pm UTC 30 mins
    Jasmine Jackson, Bug bounty hunter and cool nerd
    Bug bounty hunter and cool nerd, Jasmine Jackson will kick off our newest webinar series #SheSpeaksTech with a short talk on " Thrill of the Hunt: My Leap into Bug Bounties.

    Join this webinar series for a quick starter talk with women in cybersecurity. Each webinar will explore a new tech topic by a newbie speaker. She will deliver the first 20 minutes of her 1 hour talk and open to feedback on topic, delivery and tips. Check out (https://womenscyberjutsu.org/page/SHESPEAKSTECH) for more on SheSpeakTech or to register for your 30 minutes to shine.
  • Cloud Computing and Cloud Security Recorded: May 18 2019 53 mins
    Sapna Singh, cyber SME and advocate for women in cyber
    Join WSC and Sapna Singh, May 18th at 11 AM EST for a discussion on Cloud Computing and Cloud Security. Hear from cyber professional and advocated for women in cyber in the Middle East as she Dives into what the cloud is and how it works. After which she gets into AWS and breaks down a few of the major areas of the platform.

    This is a primer for our hands-on cloud workshop to be hosted later in the year!
  • 2019 Verizon Data Breach Investigations Report - All Women Panel Discussion Recorded: May 8 2019 63 mins
    Mary Beth Borgwing, founder of Cyber Social Club and Uniting Women in Cyber
    The 2019 Verizon Data Breach Investigations Report, now in its twelfth year, is an industry benchmark for information on cybersecurity threats and vulnerabilities. Each year this report looks at tens of thousands of security incidents and confirmed breaches. Join our all-women panel of experts for the first look at some of the key findings of the 2019 report to understand and what it all means.
  • SANS Extends High School Girls and College Student Cyber Training Programs Recorded: May 1 2019 26 mins
    Mandy Galante, SANS CyberStart Program Director
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
  • Developing Your Cyber Security Action Plan Recorded: Apr 18 2019 83 mins
    Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations
    Have you been thinking about transitioning to a career in cybersecurity, but are not quite sure how to make your dream a reality? Are you currently working a cyber job but want to make a plan for advancement? This program walks you through the steps that you need to take in order to explore your cyber career options. It gives you a structured framework for exploring your interest in cyber, researching cyber positions, learning about cyber policies and standards, learning cyber tools, obtaining cyber / IT certifications, as well as applying for cyber jobs. This approach helps you to create your own cyber career action plan so that you can position yourself to join the field of cybersecurity.

    Join Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations; & Cyberjutsu Award Winner, for an interactive discussion on building your Cyber Security Action Plan.
  • SANS Extends High School Girls and College Student Cyber Training Programs to 27 Recorded: Mar 28 2019 27 mins
    Mandy Galante, SANS CyberStart Program Director
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
  • RSAC 2019 Recap - Emerging Tech, Threats and AI Recorded: Mar 26 2019 62 mins
    Chris Roberts (Attivio Networks), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic)
    What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.

    Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
    - Top security challenges and how are we solving them
    - Biggest buzzwords: Hype vs. reality
    - Exciting new tech
    - Top conference highlights
    - Cybersecurity as a boardroom issue
    - CISO's toolbox
    - Words of wisdom for people interested in security

    This is an interactive session and the audience is encouraged to ask questions during this live webcast.
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group Recorded: Mar 21 2019 55 mins
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Recorded: Mar 13 2019 44 mins
    Brenden Bishop, Data Scientist, the Columbus Collaboratory
    Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.
  • Distinguish Signal from Noise: Find Threats in Your Security Sensor Data Recorded: Feb 27 2019 45 mins
    Slava Nikitin, Data Scientist, The Columbus Collaboratory
    Join us for this webinar that will recommend how to deal with your “big data” problem when dealing with the massive volume of raw, unprocessed data points from your network security sensors. Hint: don’t start with the data and attempt to drill down to the problem. Instead, as Slava Nitikin, Data Scientist from the Columbus Collaboratory will explain, you must start by the defining problem, building a threat model, and then focusing on the corresponding signals in your sensor data. We will walk through the use case for an Active Directory password spraying attack to demonstrate how to define and apply appropriate filters to your security data for faster detection, more accurate threat scoring and more effective security overall.
  • Survival Skills for Cybersecurity Leaders Recorded: Jan 15 2019 60 mins
    Glenn Richardson, Executive Coach, LeaderSages
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
  • Career Conversations w/ Maggie Powell, Exelon Recorded: Dec 21 2018 42 mins
    Jessica Gulick, CEO, Katzcy
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Maggy Powell , MIA, International Economic Policy, Eastern Europe

    Maggy Powell is the Senior Manager, Real Time Systems Security for Exelon. Her teams include security engineering, a security operations center and security compliance focused on real time systems across the enterprise. She is responsible for vulnerability assessment, threat management and incident response for industrial control systems and operational technology as well as compliance fulfillment for applicable CIP cyber security standards.
  • Unified Endpoint Management & Security: A Force Multiplier Recorded: Dec 13 2018 56 mins
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services Recorded: Nov 16 2018 60 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Foolproof Digital Identity with Behavioral Biometrics Recorded: Nov 15 2018 59 mins
    Ehab Samy, VP Product Management, Plurilock
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Gaining the Upper Hand on Network Vulnerabilities Recorded: Nov 8 2018 60 mins
    Nathan Vega, VP Product, Columbus Collaboratory
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • Career Conversations w/ Kristen Judge, Cybercrime Support Network Recorded: Oct 18 2018 46 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Kristin Judge, Author at LinkedIn Learning

    Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

    As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

    As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

    In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.

    To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
  • When Biometrics Simply Don't Cut It Recorded: Oct 10 2018 61 mins
    Ehab Samy, Vice President of Product Management for Plurilock
    Identifying a user through fingerprints, facial recognition or iris scanning is simply not enough for today's digital age. Join us to learn about the shift from point-in-time identification to behavioral biometrics and how it is impacting today's workforce. Ehab Samy, Vice President of Product Management for Plurilock, will explore game-changing practices in continuous authentication and identity management to control access to physical spaces, applications, and government services.
  • Career Conversations w/ Sandra Larson of Looking Glass Recorded: Oct 4 2018 42 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Sandra Larson, M.S. Applied Intelligence

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    About the Speaker:

    Sandra Larson is a Senior Director of Intelligence for LookingGlass Cyber Solutions, a cybersecurity company specializing in physical, cyber, and brand risks for small business, global enterprises and government agencies. Sandra has been with LookingGlass for almost ten years, and manages the client relationships for LookingGlass’ clientele in the food and agribusiness, pharmaceutical, retail, and technology industries. Previously, Sandra received her Master of Science in Applied Intelligence from Mercyhurst University.
  • What Your Security Team Needs to Know about GDPR Recorded: Sep 12 2018 41 mins
    Richard Stiennon from IT-Harvest & Interfocus Technologies
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Developing Your Cyber Security Action Plan
  • Live at: Apr 18 2019 11:00 pm
  • Presented by: Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations
  • From:
Your email has been sent.
or close