Hi [[ session.user.profile.firstName ]]

ITSPmagazine chats with Sarah Noyes, Director of Talent, Speak with a Geek

ITSPmagazine chats with Sarah Noyes, Director of Talent and SWAG Inclusive Diversity at Speak with a Geek. Here are some of the highlights from our conversation:

- SWAG - or Speak with a Geek, is a technical talent platform that started as a means to foster a tech talent community in which they provide opportunities: short term, full time, contract or project-based. They now have a couple million geeks in their network and their emphasis is really on community. Geek is used as an endearing term.

- SWAG often times uses a blind resume process where the administrative details, such as gender, age, or even their last name, are excluded from the resume. This really helps promote diversity and break down biases during the interview process.

- SWAG are constantly recruiting new talent every day through partnerships with resume bases, a great referral program, and even just word of mouth.

- Diversity is very important to SWAG and diversity and inclusion are not just a mission for minorities, it's for everyone. In SWAG's view, diversity creates better business.
Recorded Feb 15 2017 18 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sarah Noyes, Director of Talent and SWAG Inclusive Diversity at Speak with a Geek (SWAG)
Presentation preview: ITSPmagazine chats with Sarah Noyes, Director of Talent, Speak with a Geek

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Webcam Panel] Trends Discussed at Black Hat 2018 Aug 15 2018 5:00 pm UTC 60 mins
    Charles Tendell (The Charles Tendell Show) | Eddie Lamb (6point6) | Other Panelists TBA
    Join this post-Black Hat panel as we look at the biggest trends and cyber threats covered during the Black Hat Conference 2018 in Las Vegas.

    Tune in for an interactive Q&A panel with industry experts across the security ecosystem as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches

    Speakers:
    - Charles Tendell, Renown Cybersecurity Expert, Certified Ethical Hacker & Host of "The Charles Tendell Show"
    - Eddie Lamb, Managing Director, Cyber Security at 6point6
    - Other Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine.
  • What Keeps CISOs Up at Night: Top Security Challenges Aug 9 2018 9:30 pm UTC 60 mins
    Jay Beale (InGuardians) | Benny Czarny, Mike Yamamoto, Dave Estlick (Starbucks)
    Tune in for an in-depth look into the key issues at the top of mind for CISOs across industries. This is a Part 2 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, and how security professionals are coping with the threats and stress of protecting today's enterprise.

    Join top cyber security executives for an interactive Q&A roundtable discussion on:
    - What's new on the threatscape
    - Beyond cyber threats
    - What keeps CISOs up at night
    - Building a security culture
    - CISO to CISO recommendations

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • Changing Your Security Culture Aug 9 2018 8:00 pm UTC 60 mins
    Chris Roberts | Rick McElroy (Carbon Black)
    How can organizations increase the level of cyber awareness among their employees? What does a successful security awareness program look like? Discover what the experts think about inclusion, training and why investing in a strong security culture makes business sense.

    Join top industry experts and executives for an interactive Q&A session on:
    - How to build a corporate culture of cyber awareness
    - Why security awareness programs should be a priority
    - Beyond the bro culture mentality
    - Recruiting a diverse security workforce
    - How to attract, develop and retain women and minorities
    - Recommendations on how to change your security culture for the better

    Speakers:
    - Chris Roberts
    - Rick McElroy, Security Strategist, Carbon Black
    - Others TBA

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • Managing Your Cyber Risk Aug 9 2018 5:30 pm UTC 60 mins
    Sean Martin (ITSPmagazine) | Ed Bellis + 2 more
    Cybersecurity isn't just about detecting and responding to threats; it's also about understanding an organization's risk. In an age of high-profile cyber attacks, it's becoming increasingly important to have a strategy and process for accessing risks and their potential impact on your business.

    Join top industry experts and executives for an interactive Q&A session to learn more about:
    - How to evaluate your cyber risk
    - Recent NIST CSF risk assessment update
    - Staying on top of the latest threats and protecting the critical assets those threats can impact
    - Cyber risk insurance
    - Recommendations for improving security and minimizing your risk

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • Key Factors for CISO Success Aug 8 2018 5:30 pm UTC 60 mins
    Mark Weatherford (vArmour), Azi Cohen(WhiteSource) | Mark Whitehead (trustwave) | Joseph Kucic (Cavirin Systems)
    Tune in for this exclusive panel on the key factors for a successful security strategy. This is a Part 1 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, the factors influencing their success and the elements needed to build a more cyber resilient enterprise.

    Join top cyber security executives for an interactive Q&A roundtable discussion on:
    - The changing role of CISO
    - Why cybersecurity should be a key priority
    - Key resources every CISO needs
    - How to recruit, develop and retain security talent
    - Why investing in your security culture matters
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • A New Era of Privacy & Data Security Aug 7 2018 8:00 pm UTC 60 mins
    Debra J. Farber (BigID) | Amber Welch (Schellman & Company LLC) + 2 more
    Privacy and data protection can go hand in hand. With the General Data Protection Regulation (GDPR) the motivating force behind the recent wave of privacy policy updates across the corporate world, how are organizations coping with the increased demand for more transparency and better protections for their data?

    Join top security, privacy and risk experts for an interactive Q&A discussion to learn more about:
    - Is privacy the new marketing gold
    - How to build your privacy and data security compliance programs
    - Should you hire a Data Protection Officer
    - Breaches, data leaks and notifications
    - Recommendations for improving security and safeguarding privacy beyond GDPR's deadline day

    Speakers:
    - Debra J. Farber, Sr. Director of Privacy Strategy, BigID
    -Amber Welch, Privacy Technical Leader, Schellman & Company LLC
    - Others TBA

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • AI-Armed Cyber Adversaries: Cyber Crime & Defense in 2018 Aug 7 2018 5:30 pm UTC 60 mins
    Chenxi Wang | Justin Fier (Darktrace) | Paul Smith (Nozomi) | + 1 more
    Join security experts across the industry for an in-depth look into the ways Artificial Intelligence and Machine Learning are being used both to power cyber attacks, and to detect and respond to them faster.

    This interactive Q&A panel will go discuss:
    - Trends in AI-powered cyber attacks
    - How AI/ML can be used in security
    - Beyond automated threat detection
    - Are enterprises ready for their cyber adversaries
    - Will AI replace security teams
    - The future of AI applications in cyber attacks / cyber security

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • [Webcam Panel] What to Expect at Black Hat 2018 Jul 31 2018 5:00 pm UTC 60 mins
    Sean Martin (ITSPmagazine) | Eddie Lamb (6point6) | Other Panelists TBA
    Join this panel of industry experts as they share their experiences and thoughts on one of biggest security conferences in the world, Black Hat in Las Vegas, along with their expectations from this year's event.

    Tune in for an interactive Q&A panel with some of the biggest names in infosecurity to learn more about:
    - What can security professionals learn during Black Hat / DEF CON week
    - Must-attend events and why
    - What's new on the cyber threatscape
    - Advances in technology
    - AI: Hype vs Reality
    - Common sense advice for CISOs
    - How to keep your employees cyber safe

    Speakers:
    - Sean Martin, Co-Founder and Editor-in-Chief, ITSPmagazine
    - Eddie Lamb, Managing Director, Cyber Security at 6point6
    - Other Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine.
  • [CPE Credit Panel] Emerging Threats & Cyber Defense Recorded: Apr 18 2018 52 mins
    Chris Roberts (Acalvio) | Nick Bilogorskiy (Juniper Networks) | Dan Lohrmann (Security Mentor) | Joseph Carson (Thycotic)
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.

    Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
    - Lessons from recent cyber attacks and breaches
    - What keeps CISOs up at night
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
    - Joseph Carson, Chief Security Scientist, Thycotic

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] Beyond the Breach Recorded: Apr 18 2018 53 mins
    Sean Martin (ITSPmagazine) | Robert M. Lee (Dragos) | Dr. Bret Fund (SecureSet) | Bernard Harguindeguy (Elastic Beam)
    Massive data breaches are becoming more frequent. Personal customer data is often exposed to hackers, leaving companies and individuals to deal with the aftermath. What is the real cost of a breach and how can we prevent, detect and respond to breaches? What are some of the things to do post-breach to prevent future cyber attacks?

    Join security, risk and privacy experts for an interactive Q&A discussion on:
    - True cost of a breach
    - Preventing breaches with solutions, processes and employee training
    - How to detect attacks and breaches faster
    - Appropriate response to a breach
    - Post-breach attacks: Phishing, cyber fraud, account takeovers, cyber crime
    - Recommendations for improved security in 2018

    Speakers:
    - Sean Martin, Editor-in-Chief, ITSPmagazine
    - Robert M. Lee, CEO, Dragos
    - Dr. Bret Fund, CEO of SecureSet
    - Bernard Harguindeguy, Founder & CEO, Elastic Beam

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] GDPR, Identity & Cybersecurity Recorded: Apr 17 2018 54 mins
    Jeff Carpenter (Crossmatch) | Chris Pierson (Binary Sun Cyber) | Alex Horan (Onapsis) | Elena Elkina (Aleada)
    The General Data Protection Regulation (GDPR) is a European Union law, but it's going to impact businesses beyond the EU. Basically, any business that collects and processes personal data of EU individuals will need to achieve GDPR compliance by deadline day, May 25th, 2018.

    What are the privacy & security requirements for being GDPR compliant? -
    - Why we should think beyond GDPR when it comes to improving data security?
    - Are you compliant / ready when GDPR goes into effect next month?
    - What are some last-minute items to complete before the GDPR deadline?

    Join top experts for this interactive Q&A roundtable, streamed LIVE during RSAC week, as they discuss the implication of GDPR on managing digital identity, customer data, privacy and cyber security.

    Speakers:
    - Dr. Christopher Pierson, CEO, Binary Sun Cyber Risk Advisors
    - Jeff Carpenter, CISSP, CCSP, Crossmatch
    - Alex Horan, Director of Product Management, Onapsis
    - Elena Elkina, Partner, Aleada Consulting

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)².
  • [CPE Credit Panel] AI & Machine Learning in Cybersecurity Recorded: Apr 17 2018 53 mins
    Diana Kelley (Microsoft) | Mary Writz (Micro Focus) | Chris Morales (Vectra Networks) | Barbara Kay (ExtraHop)
    Artificial intelligence and machine learning can power cyber attacks and disrupt the operations of organizations on a global level. ML can also help organizations detect and analyze threats faster, as well as respond to attacks and security incidents. What are the latest advancements in AL & ML? How can we incorporate ML to improve our security posture and better protect our data?

    Join security experts, researchers and practitioners for an interactive Q&A roundtable discussion. Viewers will learn more about:
    - The latest AI/ML trends and applications in cyber security
    - ML tasks for better security
    - Threats, detection & response
    - Hype vs. reality
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Mary Writz, Director of Product Management, ArcSight, Micro Focus
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Barbara Kay, Sr. Director of Security, ExtraHop

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] Securing the Cloud in 2018 Recorded: Apr 16 2018 52 mins
    Sian John (Microsoft) | Mark Weatherford (vArmour) | Dan Hubbard (Lacework) | Lisa Green (ISE)
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into how enterprises are ensuring a safe migration to the cloud, protecting our data and processes in the cloud, as well as staying up to date on the latest cyber threats.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Top threats to security
    - How to better safeguard our data in the cloud

    Speakers:
    - Sian John, Chief Security Advisor, Microsoft
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Hubbard, Chief Security Architect, Lacework
    - Lisa Green, Director People Relations, Independent Security Evaluators

    The session is brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • Application Security in an Open Source World Recorded: Oct 4 2017 63 mins
    Kunal Anand, Prevoty | Rob McCurdy, MSU | Nate Smolenski, New York Life | Andy Wickersham, Fortune 100 | Sean Martin, ITSP
    Thanks for your interest in our webcast where we will be discussing how to secure applications that rely on third-party and open source software.

    Aside from the data they collect, create, and store, applications can oftentimes be an organization's greatest digital asset. Building custom applications to match the customer and market demands mapped to revenue objectives and available resources can be tremendously rewarding, but also a potentially-huge undertaking.

    Ultimately, time to market is always a factor ... a requirement that almost always wins out over security. One way to tackle the time and effort to deliver more quickly is to leverage third party and open source components. But, do these elements save you in the long run - or do they introduce more risk in the form of potential vulnerabilities that are either not easily uncovered (at best) or not easily patched (if patchable at all)?

    To answer these questions and more, we've pulled together a group of experts that deal with these challenges on a daily basis. During their conversation, webinar attendees will learn:

    - What the value of open source software (OSS) is
    - What are some common cases where open source software is utilized in today's applications
    - What are the security risks and pitfalls when using OSS
    - A view into a few case studies for companies that have fallen victim to the risks of using OSS
    - How have companies identified and mitigated the risks associates with the OSS component, Struts
    - How to tune the secure software development lifecycle (SSDLC) to account for the use of open source software

    Remember, when you register for this expert webcast you will also receive a download link for a new white paper titled "Application Security in an Open Source World."

    Your Moderator:
    Sean Martin, Editor-in-Chief, ITSPmagazine

    Expert Panelists:
    Kunal Anand, Co-Founder and CTO, Prevoty
    Rob McCurdy, CIO, MSU
    Nate Smolenski, CVP, New York Life
    Andy Wickersham, AppSec Leader, Fortune 100 Co.
  • Beyond the Equifax Breach - Lessons and Actions to Take Recorded: Sep 22 2017 64 mins
    Dr. Chris Pierson (Viewpost), Sarah Squire (Engage Identity), Debra Farber (The Privacy Pact), Dr. Ravi Rajamiyer (Cavirin)
    The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.

    Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
    - What we know occurred or is likely to have occurred
    - Data Breach Timeline - too slow or too fast
    - External communications - how has the breach been handled and communicated
    - Internal Actions - security remediation, work with law enforcement, root cause, incident response
    - External forces - lawsuits, media scrutiny, and customer communications

    Speakers:
    - Dr. Christopher Pierson, CSO, Viewpost
    - Sarah Squire, Founder and Principal Consultant, Engage Identity
    - Dr. Ravi Rajamiyer, VP of Engineering, Cavirin
    - Debra J. Farber Executive Privacy & Security Consultant, Cranium USA & Host of "The Privacy Pact," ITSPmagazine
  • GDPR Impact on Small- and Medium-Sized Businesses (Part 3 of 3) Recorded: Sep 13 2017 64 mins
    Moderator: Sean Martin, ITSPmagazine | Panelists: Eoin Keary, Edgescan | Phil Lee, Fieldfisher | Chris Hurst, BT
    Is your company based in the US and also operating in the EU? There are things you MUST learn about the Global Data Protection Regulation (GDPR). This law, which goes into effect May 25, 2018, will have an impact on your business. This expert webinar will help you prepare for what's ahead.

    Here are some topics we will be exploring:
    - Why small and medium are required to meet GDPR just like big companies.
    - What can small- and medium-sized companies do to reduce their exposure?
    - Why is this a good thing for companies to adhere to in the long run?
    - What can mid-market companies do to streamline the process?
    - What is the role of outsourced services in this? What are they?
    - What areas of waste might exist that can be eliminated?

    Moderator:
    Sean Martin, ITSPmagazine

    Panelists:
    Eoin Keary, CEO, Edgescan
    Phil Lee, CIPP/E, Partner, Fieldfisher
    Chris Hurst, Virtual CISO, British Telecom
  • Recommended Steps to Reach GDPR Compliance (Part 2 of 3) Recorded: Aug 29 2017 62 mins
    Sean Martin, ITSPmagazine | Kurt Hagerman, Armor | Mark Webber, Fieldfisher | Demetrios Lazarikos (Laz) | BlueLava
    Is your company based in the US and also operating in the EU? There are things you MUST learn about the Global Data Protection Regulation (GDPR). This law, which goes into effect May 25, 2018, will have an impact on your business. This expert webinar will help you prepare for what's ahead.

    Here are some topics we will be exploring:
    - GDPR program ownership - Is a DPO necessary?
    - What a risk-based regulation means to the business.
    - How to manage risk and reduce exposure.
    - Policy definition and control implementation requirements.
    - When something goes wrong, who do you bow down to? The EU or the US?

    Moderator:
    Sean Martin, Editor in Chief, ITSPmagazine

    Panelists:
    Kurt Hagerman, Chief Information Security Officer, Armor
    Mark Webber, US Managing Partner & Registered Foreign Legal Consultant, Fieldfisher
    Demetrios Lazarikos (Laz), InfoSec Thought Leader, BlueLava
  • How to Operate a GDPR-Compliant Business in the EU (Part 1 of 3) Recorded: Aug 17 2017 62 mins
    Sean Martin, ITSPmagazine | Rob Clyde, ISACA | Fred Kost, HyTrust | Cody Wamsley, McDonald Hopkins
    Is your company based in the US and also operating in the EU? There are things you MUST learn about the Global Data Protection Regulation (GDPR). This law, which goes into effect May 25, 2018, will have an impact on your business. This expert webinar will help you prepare for what's ahead.

    The requirements that GDPR places on organizations are wide-ranging and will impact everything from the people in the organization, to the processes and policies guiding the organization, straight through to the technology running the business. But before you can even begin to address the GDPR you need to be able to control your data. The first step in this process is knowing precisely what data you have and putting processes and tools in place to help you expose the data you don’t know you have.

    The experts on this panel will discuss and explore the following points:
    - What is the Global Data Protection Regulation?
    - Who does it impact and why?
    - What do organizations need to be aware of as they approach their compliance program?
    - What are some of the common misconceptions organizations have?
    - What things are often forgotten when organizations put together their compliance program?

    Moderator
    Sean Martin, ITSPmagazine

    Panelists
    Rob Clyde, Vice Chair of the Board of Directors, ISACA
    Fred Kost, SVP Marketing, HyTrust
    Cody Wamsley, Data Privacy & Cybersecurity Attorney, McDonald Hopkins
  • We Need a Trust and Transparency Model for The Internet of Things Recorded: Aug 16 2017 64 mins
    Sean Martin, ITSPmagazine | David Billeter and Naresh Persaud, CA Technologies | Mandeep Khera
    Today, security on the Internet is dependent on the trust between participants on the network. This is challenging because trust involves more than humans in this case and there are over 8.7 Billion devices already online today. And, trust is about to become more involved because, according to a Cisco study, 99% of the things in the world today will be connected to the Internet in the near future which means we will need a new model for trust and digital identity to manage this massive scale of trust we will need.

    In this ITSPmagazine webinar, a panel of subject matter experts will explore the challenges and solutions to building trust on the Internet of things, looking at what identity means in the world of mobile devices and other Internet-connected things. Remember, it's not just the user that has an identity...

    Some of the topics planned for the discussion include:
    - What are some of the devices we see being used in business?
    - Why do devices need identities?
    - What does device-to-user authentication look like?
    - What does device-to-device authentication look like?
    - What role do applications play in the IoT world?
    - How can all of these identities and activities be managed and policies enforced at scale?

    --------

    Moderator
    - Sean Martin, CISSP, Editor-in-Chief at ITSPmagazine

    Expert Panelists
    - David Billeter, CISO at CA Technologies
    - Mandeep Khera, Information Security Thought Leader and Executive
    - Naresh Persaud, Sr. Director Security, Product Marketing, CA Technologies
  • It’s Time To Take Charge Of Our Digital Future Recorded: Jul 26 2017 55 mins
    Ariel Robinson, ITSPmagazine | Jay Beale, Inguardians | Jessy Irwin, Jessysaurusrex | Mzbat
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    Disruptors and visionaries across the globe are pushing the boundaries of science and technology, economics and industry, healthcare, policy, communications, and governance. From these advances emerge new career paths, educational disciplines, and opportunities for creation and discovery.

    But things don't always work the way we expect them to, and the consequences of disruption are impossible to predict. What is sacrificed for the sake of efficiency or convenience? Who gets to make that call? Whose fault is it when pre-teens get radicalized online, or health records get misused for unauthorized research? And whose job is it to prevent that from happening? Is prevention even possible?

    Individuals, enterprises, and society writ large have the right and responsibility to proactively shape and secure the future, but our ability to do so is at risk. As technology continues to proliferate without being well understood, people who fall victim to its failure or misuse feel more and more disempowered to prevent future damage. This is The Tech Effect: the complacency driven by the complexity of the technology ecosystem, and a rejection of responsibility for individual and collective safety, security, and ethics.

    It’s time to take charge of our digital future.

    Join us for this lively conversation.

    Moderator:
    - Ariel Robinson, Editor & Host, The Tech Effect, ITSPmagazine

    Panelists:
    - Jay Beale, CTO & COO, InGuardians
    - Jessy Irwin, Security Empress at Jessysaurusrex
    - Mzbat
At the Intersection of IT Security & Society
ITSPmagazine is an online publication that focuses on Information Technology Security and the influence that it has on our everyday life, as Individuals and as the Society we live in. And, for a change, the other way around.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ITSPmagazine chats with Sarah Noyes, Director of Talent, Speak with a Geek
  • Live at: Feb 15 2017 4:00 pm
  • Presented by: Sarah Noyes, Director of Talent and SWAG Inclusive Diversity at Speak with a Geek (SWAG)
  • From:
Your email has been sent.
or close