Hi [[ session.user.profile.firstName ]]

Firewalking: A Female Perspective on Breaking Barriers

In 2018, 20% of all jobs in technology were held by women (Source: Small Business Trends). Fortune 500 companies with at least 3 women in leading positions saw a 66% increase in ROI (Source: Women Who Tech). In this panel, led by Dr. Dawn Beyer, we will share our unique experiences on how we have bypassed firewalls to enter a male dominated field while opening doors for others to do the same.
Recorded Aug 26 2020 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Dawn Beyer, Jacque Blanchard, Tammy McNeley, and Valerie Underwood
Presentation preview: Firewalking: A Female Perspective on Breaking Barriers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • NEURODIVERSITY – untapped talent that can help meet the cyber skills shortage Live 60 mins
    Diane Delaney (IBM), Megan Roddie (IBM)
    Neurodivergent people have unique abilities and skills that make them particularly successful in cybersecurity jobs. Learn how tech companies like IBM are building neurodiversity programs and leveraging the untapped neurodivergent talent pool to help fill a cybersecurity skills shortage and make their teams more diverse and inclusive.

    Join a dynamic duo -- Diane Delaney and Megan Roddie -- as they talk about neurodiversity and cybersecurity at IBM. Diane Delaney is IBM’s Neurodiversity Program Manager, and Megan Roddie is a Cyber Threat Researcher at IBM and co-founder of IBM’s Actually Autistic Task Force.
    Together, they will talk about the importance of having neurodivergent teams. Diane will discuss how to attract and retain neurodivergent talent, and the importance of having diversity on a cyber team. Megan will discuss how her abilities as an autistic person have helped her be a successful cyber threat researcher, and how other organizations can attract and retain neurodivergent talent. For those looking to build skills, Diane and Megan will discuss how neurodivergent talent can begin building skills and training in cyber to land a job in high-tech.
  • Q & A on WiCyS Mentor/Mentee Program Recorded: Oct 16 2020 38 mins
    Archana Ramamoorthy, Chief Technology Officer at Workday and Lynn Dohm, Executive Director at WiCyS
    Join Archana Ramamoorthy and Lynn Dohm for a Q & A session on the WiCyS Mentor/Mentee Program. Learn about our matching process for creating robust cohorts that will help level-up one's career, how and why the curriculum was developed, and the structure of the 12-month program.
  • How to Secure Systems by Thinking Like an Attacker Recorded: Oct 15 2020 47 mins
    Katie Grzywacz (Lockheed Martin)
    Threats and computing systems are constantly evolving. Lists of vulnerabilities and corresponding security controls quickly become outdated. How do you effectively secure systems when there is so much change? This talk will demonstrate how we can leverage adversarial thinking to build more secure systems.

    Bio: Katie Grzywacz has held numerous security roles during her 15 years at Lockheed Martin including cyber architect, penetration tester, security engineer. She is currently the chief cyber architect for the Lockheed Martin Space Centers of Excellence.
  • Simple Steps to Security Success Recorded: Oct 14 2020 57 mins
    Cassia Martin (AWS)
    Amazon Web [Security] Services enables every organization to have enterprise-grade security. You don’t need a dedicated cloud security team to have security in the cloud and having a high-security bar does not mean your teams have to slow down. This session will take you through patterns you can implement today to raise your security posture without needing to hire additional staff or break the bank. This session will also demonstrate how AWS Control Tower can be leveraged to add guardrails to your AWS usage in addition to the steps needed to set up a secure data bunker. Attendees are expected to have an understanding of the AWS shared responsibility model.
  • Why Mentorship Matters Recorded: Oct 13 2020 60 mins
    Noureen Njoroge (Cisco)
    Mentorship makes a notable difference, builds a more knowledgeable workforce and advances mentees into careers. Join the webinar to learn qualities of a good mentor/mentee relationship, what a successful mentorship program looks like and where to find mentors in cybersecurity!
  • Fundamentals of AWS Security Recorded: Sep 30 2020 64 mins
    Becky Weiss, Senior Principal Engineer (AWS)
    The services that make up AWS are many and varied, but the set of concepts you need to secure your data and infrastructure are simple and straightforward. By the end of this session, you will know the fundamental patterns that you can apply to secure any workload you run in AWS with confidence. We cover the basics of network security, the process of reading and writing access management policies, and data encryption.
  • Firewalking: A Female Perspective on Breaking Barriers Recorded: Aug 26 2020 46 mins
    Dr. Dawn Beyer, Jacque Blanchard, Tammy McNeley, and Valerie Underwood
    In 2018, 20% of all jobs in technology were held by women (Source: Small Business Trends). Fortune 500 companies with at least 3 women in leading positions saw a 66% increase in ROI (Source: Women Who Tech). In this panel, led by Dr. Dawn Beyer, we will share our unique experiences on how we have bypassed firewalls to enter a male dominated field while opening doors for others to do the same.
  • Build Your Virtual Brand: Tips for Navigating Online Recruitment Recorded: Aug 11 2020 57 mins
    Target experts
    Join the Target team for a fun career development workshop focused on building your virtual brand. You’ll have the opportunity to connect with the Target Recruitment team on learning valuable skills to help you navigate the job hunt during this unprecedented time.
  • [PANEL] Security as a Service Recorded: Jul 13 2020 54 mins
    Stephanie Olsen | Sailaja Kotra-Turner | John Frazier | Jeremiah Dewey, Rapid7
    As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

    -Why your organisation needs to move towards SEaaS
    -The different models of security as a service
    - SEaaS solutions and strategies


    Stephanie Olsen, Customer Trust Manager, Product & Application Security, Netflix & WiCyS Silicon Valley Affiliate President
    Sailaja Kotra-Turner, CISO
    John Frazier, Chief Operating Officer, Synoptek
    Jeremiah Dewey, VP Managed Services, Rapid7
  • AWS Security JAM x WiCyS | Interactive Learning Series Recorded: Jul 9 2020 61 mins
    AWS experts
    Are you interested in learning how YOU can build securely on AWS? Join us for the AWS Security Jam learning series - a hands-on, team-oriented, gamified learning experience which will enable you to leverage a wide range of AWS security services. If you get excited about securing workloads in the cloud, come and challenge your skills while learning new techniques. AWS will host three Security Jam sessions (beginners, intermediate, and advanced), so join us for all three or pick the session most relevant to you. We will have a number of AWS experts virtually available to discuss ideas, provide guidance, and help your team get through any challenges.
  • Security Frenemies: Red & Blue Boosting Each Other Recorded: Jun 24 2020 62 mins
    Matt Linton, Detection and Response, and Niru Ragupathy, Offensive Security
    Matt Linton, a member of Google's Detection and Response team and Niru Ragupathy, a member of Google's Offensive Security team pair up to showcase how red and blue teamers can learn from each other. They walk through a hypothetical attack from start to finish, at each step switching between the point of view of Attackers and Defenders to highlight what each side sees and does, showcasing what makes each side rewarding and fun.
  • Q&A: Racial Equity and Inclusion, Cybersecurity and What it Means to be an Ally Recorded: Jun 23 2020 62 mins
    Jessica Robinson, CEO, PurePoint International
    We are committed to racial equity within WiCyS and the cybersecurity profession. Join us for a candid conversation on what it means to be an ally for the BIPOC cybersecurity community. Jessica Robinson will host a Q&A session to share more about her experience in infosec through the lens of race and gender and how we can all be allies.
  • Cyber Breach Fatigue Recorded: Mar 31 2020 36 mins
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    The stream of near constant data breaches has left consumers desensitized to the news their information was lost or stolen. We’ll discuss issues around complacency both in consumers and enterprises such as how long the customer cares after a breach occurs, whether data loss is as negatively impactful to an organization’s reputation as it used to be, and how breach fatigue benefits hackers.
  • Orchestrating Various Roles to Uplift Security at Acquisitions Recorded: Feb 19 2020 49 mins
    Ruchi Shah, Sr Security Engineering Manager at Google
    Security is becoming an integral part of the M&A decision making process. In this talk, we will discuss what Google Security worries about when we acquire or start a company and how different roles within the security organization work in synchronization to make the overall integration secure and successful.

    Ruchi is a Sr Security Engineering Manager at Google where she manages an organization whose mission is to secure Acquisitions and Alphabets. In her role, she leads security engineering and technical program management functions. Prior to joining Google, she spun up the Subsidiary Security Program at Amazon and managed the product roadmap for AWS Identity and Access Management and AWS Key Management services. Ruchi has worked at Deloitte and Touche LLP and Ernst and Young, where she helped clients implement security solutions ranging from Identity and Access Management (IAM), Security Information and Event Management (SIEM) to Network Security Products. She has over 13 years of experience in Security.
  • Good vs Bad Metrics Recorded: Feb 18 2020 31 mins
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    Security leaders are increasingly basing their decisions on metrics to justify spending, quantifying risk, and demonstrating value to the executive suite. This panel of leaders will discuss how they are awash in dashboards, charts, and KPIs of little to no value and what they’ve done to develop contextual, impactful, actionable metrics.
  • Offensive vs Defensive Security Recorded: Jan 22 2020 26 mins
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    US Cyber Command has undergone a significant shift in strategies away from defense and deterrence to engagement and forward disruption. We’ll discuss whether offensive cyber actions deter or invite retaliatory attacks, impacts to private industry (both positive and negative), and whether enterprise security offices should take offensive measures and if so – how far should we go?
  • Taking a Global Look at Market Access Requirements in Cybersecurity Landscape Recorded: Dec 17 2019 43 mins
    Samantha Symonds, Security & Trust Cybersecurity Advisor for Cisco Systems
    In this talk, we will discuss the portion of cybersecurity known as ‘market access’. We will dive into what market access requirements are and what they mean for cybersecurity professionals as well as to the world. We will go over the different types of market access requirements as well as discuss from a geopolitical standpoint where cybersecurity is moving in this space and what we are expecting to happen in the near future.

    We will breakdown the most common/popular market access requirements and discuss the security domains that are tested as well as the most common security best practices covered. We will cover both the differences and similarities in cloud and on-premises based cybersecurity market access requirements as well as go into the different cybersecurity requirements per business need (i.e. financial, medical, etc.).

    We will also go through who specifically is involved in influencing and creating these global market access requirements, the specific technical and business requirements that go into these regulations, the specific types of businesses, users, or governments affected, as well as what these market access requirements satisfy in the global cybersecurity landscape, and what they are lacking in the current market. We will map out the global viewpoint of cybersecurity market access certifications, attestations, regulations, and accreditations as well as dive into what the typical engagement process looks like, and how the overall cybersecurity posture of what is being tested is determined.

    In summary, this is meant to be a technical discussion on cybersecurity certifications/attestations/regulations/accreditations from the global perspective to take a deeper look at what we are seeing from different countries and where we are seeing trends emerge from key influential regulating bodies. Some market access requirements we will go into are ISO 27001, SOC2, C5 (Germany), SecNumCloud (France), R226, Common Criteria, and many more.
  • Women in Cyber | Top Talent Initiatives Recorded: Dec 6 2019 52 mins
    Dawn Beyer, Senior Fellow, Lockheed Martin Space
    Attracting, developing, and retaining women in cyber top talent fields (continuation on the March WiCyS Conference Keynote).

    Dr. Dawn Beyer is a Lockheed Martin Senior Fellow. She has over 30 years of experience covering information security, information assurance, security engineering, cybersecurity, systems engineering, military intelligence and operations, risk assessments, strategy, and policy development and execution. She provides consultation to research and development, proposal, program, and operations and maintenance teams. She also provides guidance, direction, leadership, training, and mentoring to Engineers.

    Dr. Beyer provides leadership with visibility into cyber strategy, workforce talent, technology, capabilities, risks, policy, and opportunities. At Lockheed Martin, Dr. Beyer is the Cyber Fellows Action Team Chair. She also engages in industry exchanges and Co-chairs the National Defense Industrial Association Cybersecurity Division and is a member of the INCOSE Systems Security Engineering Working Group. She is also a board member with the Women in CyberSecurity (WiCyS) Board of Governors.

    Dr. Beyer is a retired Air Force Intelligence Officer with 24 years of service and has performed additional responsibilities as an Information Systems Security Manager, Computer Systems Security Officer, Communications Security Manager, Operations Security Manager, and Emissions Security Manager.

    Dr. Beyer earned her Ph.D., M.S., and B.S. in Information Systems. She maintains the following certifications: Project Management Institute’s Program Management Professional (PMP)®, (ISC)2’s Certified Information Systems Security Professional (CISSP)® and Certified Secure Software Lifecycle Professional (CSSLP)®, and ISACA’s Certified Information Security Manager (CISM)®.
  • Cyber Skills for the Security Industry: How to Bridge the Talent Gap Recorded: Dec 5 2019 60 mins
    Min Kyriannis, Head, Technology Business Development, Jaros, Baum & Bolles, Andrew Lanning, Co-Founder, Integrated Security
    Join the Security Industry Association (SIA) and the Women in CyberSecurity (WiCyS) for the reveal of insights from a research project into the cyber skills gap within the electronic physical security industry.

    In addition to presenting findings from SIA’s 2019 Security Industry Cyber Skills Gap Study, our speakers will explore how both industries must change to help attract talented cybersecurity professionals and will examine the wave of emerging high-tech cybersecurity employment roles within systems integration firms and physical security IoT-device and solution developers.

    The webinar will:
    •Analyze the types of cybersecurity skills that electronic physical security technology companies need
    •Educate cybersecurity professionals about employment opportunities within systems integration firms and producers of IoT devices, physical security solutions and software.
    •Correlate skills held by young cyber professionals with the skills required by technology companies producing physical security solutions
    •Share insight into the industry perceptions and career motivations of cybersecurity students and professionals
  • Getting Started with WiCyS Student Chapters and Making an Impact Recorded: Oct 16 2019 61 mins
    Dr. Vitaly Ford, Professor Pauline Mosley, and the Tennessee Tech Chapter Students
    In this webinar, we will talk about how to get started as a Women in CyberSecurity (WiCyS) Student Chapter and share ideas on activities, funding, sustainability, competitions, and resources.
Advancing the mission of diversity in the cybersecurity workforce
Addressing diversity and talent shortages in cybersecurity through recruiting, retaining and advancing women in the field of cybersecurity, and improving on the very low 20-24% statistic of women in cybersecurity jobs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Firewalking: A Female Perspective on Breaking Barriers
  • Live at: Aug 26 2020 6:00 pm
  • Presented by: Dr. Dawn Beyer, Jacque Blanchard, Tammy McNeley, and Valerie Underwood
  • From:
Your email has been sent.
or close