Ed TALKS: Diversity & Inclusion in Cybersecurity – Reaping the Rewards

Logo
Presented by

Ed Adams, Security Innovation | Larry Ponemon, The Ponemon Institute | Devon Bryan, Carnival | Sarah Morales, Google

About this talk

Got D&I on your mind? You should. It’s a scientific fact that diverse teams make better decisions, operate more profitably, and are more innovative problem solvers. The cybersecurity talent shortage is a crisis, yet the diversity gap is stark with women and minorities, and we haven’t figured out how to cultivate this talented pool. Find out how it’s done – from experts who have succeeded and have dedicated themselves to the cause. Featuring fresh research from The Ponemon Institute, this panel will discuss the state of D&I in cybersecurity, including: • Trends and other data that highlight disparity • What roadblocks (still) exist and strategies to blast them out of the way • Where and how to find untapped talent and how • How globally recognized organizations have successfully built D&I programs Hope you can join us as we band together to advance D&I in cybersecurity.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (164)
Subscribers (14710)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.