Hi [[ session.user.profile.firstName ]]

Launching an Affiliate: Lessons Learned from the Mid-Atlantic Affiliate Chapter

Join WiCyS in an open conversation with board members from the first WiCyS Affiliate Chapter! These dynamic ladies will be discussing the steps to successfully launch an affiliate chapter which includes the trials, the tribulations, the challenges, and most importantly... the lessons learned!
Recorded Jun 14 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nikkia Henderson
Presentation preview: Launching an Affiliate: Lessons Learned from the Mid-Atlantic Affiliate Chapter

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Breach Fatigue Mar 31 2020 7:00 pm UTC 60 mins
    Rhonda Bricco (UnitedHealth Group), Mary Diner (Optum), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    The stream of near constant data breaches has left consumers desensitized to the news their information was lost or stolen. We’ll discuss issues around complacency both in consumers and enterprises such as how long the customer cares after a breach occurs, whether data loss is as negatively impactful to an organization’s reputation as it used to be, and how breach fatigue benefits hackers.
  • Good vs Bad Metrics Feb 18 2020 8:00 pm UTC 60 mins
    Rhonda Bricco (UnitedHealth Group), Mary Diner (Optum), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    Security leaders are increasingly basing their decisions on metrics to justify spending, quantifying risk, and demonstrating value to the executive suite. This panel of leaders will discuss how they are awash in dashboards, charts, and KPIs of little to no value and what they’ve done to develop contextual, impactful, actionable metrics.
  • Offensive vs Defensive Security Jan 22 2020 8:00 pm UTC 60 mins
    Rhonda Bricco (UnitedHealth Group), Mary Diner (Optum), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    US Cyber Command has undergone a significant shift in strategies away from defense and deterrence to engagement and forward disruption. We’ll discuss whether offensive cyber actions deter or invite retaliatory attacks, impacts to private industry (both positive and negative), and whether enterprise security offices should take offensive measures and if so – how far should we go?
  • How will Quantum Computing Impact Cryptography? Jan 17 2020 9:00 pm UTC 60 mins
    Sadaf Syed, Software Engineer at Cisco
    Quantum computing is the next generation of computing that utilizes quantum physics using typically subatomic particles, quantum bits (quits), which can exists in a continuum of states between 1 and 0 until observed. It is exponentially faster than the classical computing in solving certain problems. There are quantum computing prototypes already available as cloud services. With quantum computing becoming a near-future reality, where does the future of cryptography stands? Is our data and security under threat in the quantum computing era?

    About the presenter:
    Sadaf Syed is a software engineer at Cisco working on the Firepower Next Generation Firewall (NGFW). She has MSc in Electrical and Computer Engineering from the University of Texas at Austin. When she is not coding, she likes to look up at the stars and photography the night sky. Her interest in astronomy and physics, along with her security background excites there to research Quantum Computing.
  • Taking a Global Look at Market Access Requirements in Cybersecurity Landscape Dec 17 2019 7:00 pm UTC 60 mins
    Samantha Symonds, Security & Trust Cybersecurity Advisor for Cisco Systems
    In this talk, we will discuss the portion of cybersecurity known as ‘market access’. We will dive into what market access requirements are and what they mean for cybersecurity professionals as well as to the world. We will go over the different types of market access requirements as well as discuss from a geopolitical standpoint where cybersecurity is moving in this space and what we are expecting to happen in the near future.

    We will breakdown the most common/popular market access requirements and discuss the security domains that are tested as well as the most common security best practices covered. We will cover both the differences and similarities in cloud and on-premises based cybersecurity market access requirements as well as go into the different cybersecurity requirements per business need (i.e. financial, medical, etc.).

    We will also go through who specifically is involved in influencing and creating these global market access requirements, the specific technical and business requirements that go into these regulations, the specific types of businesses, users, or governments affected, as well as what these market access requirements satisfy in the global cybersecurity landscape, and what they are lacking in the current market. We will map out the global viewpoint of cybersecurity market access certifications, attestations, regulations, and accreditations as well as dive into what the typical engagement process looks like, and how the overall cybersecurity posture of what is being tested is determined.

    In summary, this is meant to be a technical discussion on cybersecurity certifications/attestations/regulations/accreditations from the global perspective to take a deeper look at what we are seeing from different countries and where we are seeing trends emerge from key influential regulating bodies. Some market access requirements we will go into are ISO 27001, SOC2, C5 (Germany), SecNumCloud (France), R226, Common Criteria, and many more.
  • Women in Cyber | Top Talent Initiatives Recorded: Dec 6 2019 52 mins
    Dawn Beyer, Senior Fellow, Lockheed Martin Space
    Attracting, developing, and retaining women in cyber top talent fields (continuation on the March WiCyS Conference Keynote).

    Dr. Dawn Beyer is a Lockheed Martin Senior Fellow. She has over 30 years of experience covering information security, information assurance, security engineering, cybersecurity, systems engineering, military intelligence and operations, risk assessments, strategy, and policy development and execution. She provides consultation to research and development, proposal, program, and operations and maintenance teams. She also provides guidance, direction, leadership, training, and mentoring to Engineers.

    Dr. Beyer provides leadership with visibility into cyber strategy, workforce talent, technology, capabilities, risks, policy, and opportunities. At Lockheed Martin, Dr. Beyer is the Cyber Fellows Action Team Chair. She also engages in industry exchanges and Co-chairs the National Defense Industrial Association Cybersecurity Division and is a member of the INCOSE Systems Security Engineering Working Group. She is also a board member with the Women in CyberSecurity (WiCyS) Board of Governors.

    Dr. Beyer is a retired Air Force Intelligence Officer with 24 years of service and has performed additional responsibilities as an Information Systems Security Manager, Computer Systems Security Officer, Communications Security Manager, Operations Security Manager, and Emissions Security Manager.

    Dr. Beyer earned her Ph.D., M.S., and B.S. in Information Systems. She maintains the following certifications: Project Management Institute’s Program Management Professional (PMP)®, (ISC)2’s Certified Information Systems Security Professional (CISSP)® and Certified Secure Software Lifecycle Professional (CSSLP)®, and ISACA’s Certified Information Security Manager (CISM)®.
  • Cyber Skills for the Security Industry: How to Bridge the Talent Gap Recorded: Dec 5 2019 60 mins
    Min Kyriannis, Head, Technology Business Development, Jaros, Baum & Bolles, Andrew Lanning, Co-Founder, Integrated Security
    Join the Security Industry Association (SIA) and the Women in CyberSecurity (WiCyS) for the reveal of insights from a research project into the cyber skills gap within the electronic physical security industry.

    In addition to presenting findings from SIA’s 2019 Security Industry Cyber Skills Gap Study, our speakers will explore how both industries must change to help attract talented cybersecurity professionals and will examine the wave of emerging high-tech cybersecurity employment roles within systems integration firms and physical security IoT-device and solution developers.

    The webinar will:
    •Analyze the types of cybersecurity skills that electronic physical security technology companies need
    •Educate cybersecurity professionals about employment opportunities within systems integration firms and producers of IoT devices, physical security solutions and software.
    •Correlate skills held by young cyber professionals with the skills required by technology companies producing physical security solutions
    •Share insight into the industry perceptions and career motivations of cybersecurity students and professionals
  • Getting Started with WiCyS Student Chapters and Making an Impact Recorded: Oct 16 2019 61 mins
    Dr. Vitaly Ford, Professor Pauline Mosley, and the Tennessee Tech Chapter Students
    In this webinar, we will talk about how to get started as a Women in CyberSecurity (WiCyS) Student Chapter and share ideas on activities, funding, sustainability, competitions, and resources.
  • N00bSec to Cyber-Champion: How I Used CTFs Launch My Career in Cybersecurity Recorded: Oct 2 2019 61 mins
    Kaitlyn Bestenheider, Senior Information Security Associate for Tevora and Chief Player Ambassador for National Cyber League
    Too often, when I tried to learn cybersecurity in a classroom lab, I found that it existed in a sphere of ideal conditions: we were given the perfect command on the perfect target to get the perfect results on that target. As it turns out, the real world has less than ideal conditions, so I wasn’t sure how my education was going to translate to the real world. That’s when I discovered cyber competitions. In the CTF’s I began to play, I found that there were no wrong ways to get a right answer and I was finally able to hit the ground running in a way that felt like I was preparing for the workforce. Just over a year into my career, I can say that Cyber CTF’s prepared me better than any classroom experience could. Join me on Wednesday, October 2nd to find out how this newbie took her skills from #N00bSec to #Cyber-Champion using CTF’s!
  • Pivoting to a Career in Cybersecurity Recorded: Sep 12 2019 61 mins
    Teresa Merklin, Lockheed Martin Aeronautics Company
    This Lockheed Martin presentation introduces the concepts of career pivots for women who are contemplating or executing a pivot as well as anyone who might have the need to navigate a career pivot in the future. Keys to successful career pivots are identified and the general steps to be performed are described. Specific considerations for pivoting into careers in cybersecurity are also provided.
  • Why Cybersecurity and Physical Security Belong Together Recorded: Sep 4 2019 51 mins
    Min Kyriannis, Head of Cybersec, Jaros, Baum & Bolles & Valerie Thomas, Exec Information Security Consultant, Securicon
    In this webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA), cybersecurity consultants Min Kyriannis (Jaros, Baum & Bolles) and Valerie Thomas (Securicon) will explore the important relationship between cybersecurity and physical security.

    Drawing lessons from real-world threats and attacks, our speakers will look at how cybersecurity vulnerabilities can be used to compromise physical security systems and why cybersecurity of IT systems depends on controlling physical security. We’ll discuss why CSOs, IT leaders, cybersecurity professionals and vendors/service providers all need to be paying attention to the cybersecurity of physical systems, and we’ll discuss what it means to drive security convergence at both strategic and operational levels, and how new technologies like AI factor into today’s converged security models.

    Key Focuses:
    •How to evaluate and improve the cybersecurity of cyber-physical systems
    •How threat actors are targeting cyber weaknesses in physical security systems
    •Why security convergence matters and what the relationship between cybersecurity and physical security teams can look like
    •How new technologies like AI are evolving security

    Key Topics: Cybersecurity, Physical security, Security convergence, Hacking, Hackers, cyber-physical systems, Security management
  • Women Leaders in Equifax Security: Diverse Perspectives Recorded: Aug 15 2019 60 mins
    Meghan Caputo, Ahmad Douglas, Diana Dudas, Courtney Healey, Jamila Ramsay, and Katalina Reynolds
    The terms security and cyber (short for cybersecurity) are often used interchangeably, referring to the profession narrowly defined as a team of professionals who leverage technologies and processes to defend an organization’s systems and networks from attack. However, this narrow use of security sells the field short – there are in fact a number of key functions under the security umbrella, one of which is cybersecurity, all of which are essential to the success of the organization. Some such functions are: physical security, fraud prevention, privacy, business continuity, disaster recovery, and risk management, although there are still more. And though the security field is defined by the technical “hacker” persona, people with backgrounds, skills, and interests of a wide variety have all found success under the umbrella of work in the security field.

    Join our webinar to hear from several of Equifax’s women leaders who have come to security from different educational backgrounds, former careers, and interests, but who share a passion for challenging work, career growth, and personal excellence. Learn about their career journeys that led them to security, how they apply their interests and training to their current work and future professional goals, and hear the advice they have for the next generation of women in security. Bring your questions, too, and participate in this lively interactive discussion!
  • Pwn Your Growth | Life Hacks Leading to Career Advancement Recorded: Jun 26 2019 60 mins
    Jacquelyn Blanchard
    When was the last time you did something new for the first time? Your career growth requires you to be intentional. In this presentation, you'll gain insights on ways you, as a female in cybersecurity, can hack your way into a successful cyber career.
  • Launching an Affiliate: Lessons Learned from the Mid-Atlantic Affiliate Chapter Recorded: Jun 14 2019 60 mins
    Nikkia Henderson
    Join WiCyS in an open conversation with board members from the first WiCyS Affiliate Chapter! These dynamic ladies will be discussing the steps to successfully launch an affiliate chapter which includes the trials, the tribulations, the challenges, and most importantly... the lessons learned!
  • Benchmarks for Corporate Cybersecurity Recorded: Feb 26 2019 62 mins
    Marilia Wyatt (WSJ Pro Cybersecurity), Lou Celi (ESI ThoughtLab) and Kim Landgraf (Security Industry Association/SIA Women)
    Presented by WiCyS and SIA...

    This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.

    In this 45-minute program, we’ll also share a new tool that allows you to compare your own organization’s preparedness to the aggregated data of study participants.

    Expect to Learn:
    •Current threats organizations are facing
    •Cyber risk management approaches
    •Where organizations plan technology and staffing investments for cybersecurity
    •The impact of cybersecurity “maturity”
    •The costs of cybersecurity breaches

    Presenters:
    •Marilia Wyatt (WSJ Pro Cybersecurity)
    •Lou Celi (ESI ThoughtLab)
    •Kim Landgraf (Security Industry Association / SIA Women in Security Forum)

    Interviewer:
    •Taly Walsh, Executive Director (WiCyS)
  • Moving the Needle - Women in CyberSecurity Recorded: Feb 8 2019 61 mins
    Taly Walsh, Executive Director, WiCyS
    A new study has updated the ratio of women to men in the cybersecurity workforce – from 11% to 20%. Yet more than 300,000 cybersecurity jobs are unfilled today, a number that is exponentially growing into the millions. Let's do something to move the needle to 50% women in cybersecurity!

    Women in CyberSecurity (WiCyS), a non-profit organization with deep roots in academia, government and industry, is driving to increase recruitment, retention and advancement of women in cybersecurity.

    During this engaging webinar for diversity recruiters and women in various stages of cybersecurity careers, we will interview two WiCyS Board Members who offer stats and important guidelines for recruitment and retention of women in cybersecurity.

    Featuring:
    Dr. Janell Straach, Chairman of the Board, WiCyS - Director, Center for Engaging Women in Cybersecurity, University of Texas Dallas

    Dr. Costis Toregas, Treasurer, WiCyS - Director, Cyber Security and Privacy Research Institute, George Washington University

    Interviewer: Taly Walsh, Executive Director, WiCyS
Advancing the mission of diversity in the cybersecurity workforce
Addressing diversity and talent shortages in cybersecurity through recruiting, retaining and advancing women in the field of cybersecurity, and improving on the very low 11% statistic of women in cybersecurity jobs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Launching an Affiliate: Lessons Learned from the Mid-Atlantic Affiliate Chapter
  • Live at: Jun 14 2019 6:00 pm
  • Presented by: Nikkia Henderson
  • From:
Your email has been sent.
or close