Hi [[ session.user.profile.firstName ]]

NEURODIVERSITY – untapped talent that can help meet the cyber skills shortage

Neurodivergent people have unique abilities and skills that make them particularly successful in cybersecurity jobs. Learn how tech companies like IBM are building neurodiversity programs and leveraging the untapped neurodivergent talent pool to help fill a cybersecurity skills shortage and make their teams more diverse and inclusive.

Join a dynamic duo -- Diane Delaney and Megan Roddie -- as they talk about neurodiversity and cybersecurity at IBM. Diane Delaney is IBM’s Neurodiversity Program Manager, and Megan Roddie is a Cyber Threat Researcher at IBM and co-founder of IBM’s Actually Autistic Task Force.
Together, they will talk about the importance of having neurodivergent teams. Diane will discuss how to attract and retain neurodivergent talent, and the importance of having diversity on a cyber team. Megan will discuss how her abilities as an autistic person have helped her be a successful cyber threat researcher, and how other organizations can attract and retain neurodivergent talent. For those looking to build skills, Diane and Megan will discuss how neurodivergent talent can begin building skills and training in cyber to land a job in high-tech.
Recorded Oct 28 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diane Delaney (IBM), Megan Roddie (IBM)
Presentation preview: NEURODIVERSITY – untapped talent that can help meet the cyber skills shortage

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ensuring a Technology Relevant Workforce Oct 18 2021 6:00 pm UTC 60 mins
    Pam Sheary
    The pace of emerging technologies has increased significantly, challenging individuals to maintain knowledge of relevant skills and Business Areas to staff programs with the appropriate level of engineering skills needed for optimum performance on contract in a timely manner. Develop strategies that enable a proactive rather than reactive approach, allowing engineers and organizations to stay ahead of the curve to optimize on contract performance and be prepared for future work. Learn about different engineering shapes to determine which shape is most appropriate for you and /or your organization. Broaden your horizons and explore available options that can be used to develop a Personal Development Plan that includes learning new skills and gaining experience using these skills. Don’t miss opportunities – stay ahead of the curve!

    Pam Sheary is a Lockheed Martin Fellow with 30+ years of software and systems engineering experience in the Department of Defense (DoD) industry, including 12 years managing International software development efforts. She continues to serve as the Chief Software Engineer on very large government contracts. Pam is a recognized technical leader within Agile / DevSecOps, Quantitative Management, and Risk and Opportunity Management. Pam’s work to establish Enterprise-level Code Quality has been leveraged across various government agencies. Prior to joining Lockheed Martin, Pam served in various Software and Systems engineering roles developing and testing software embedded systems and application development tools with geographically dispersed teams. Pam earned a bachelor’s degree in Computer Science & Mathematics from the University of Pittsburgh with continued graduate studies in Computer Engineering and Web Design /Accessibility. She holds several certifications, including the Scaled Agile Framework (SAFe®) and SAFe® for Government.
  • 5G IoT Security Sep 16 2021 5:00 pm UTC 60 mins
    Praveena Sridhar
    5G IoT is the latest in the IoT World. This next generation of mobile technology, with features such as Enhanced Mobile Broadband, Ultra-Reliable Low Latency Communication, and Massive IoT, is set to radically re-shape today’s mobile networks. This webinar aims at depicting the high-level composition of the end-to-end 5G network architecture termed as 5GS (5G System) and Security in this space.
  • No Silver Bullet – Essence and Accident in Cyber Resiliency Engineering Sep 14 2021 6:00 pm UTC 60 mins
    Teresa Merklin
    Cybersecurity incidents and failures impact critical public infrastructure, national defense, corporate economic interests, and personal privacy. As the magnitude and frequency of cyber events continues to escalate, vendors and agencies are desperately seeking solutions to solve this issue once and for all. In the 1980’s the software development industry was facing similar challenges. That crisis prompted Frederick Brooks to write his iconic paper “No Silver Bullet – Essence and Accident in Software Engineering.” The solutions and technologies detailed in that paper are eerily similar to the “breakthrough” solutions currently proposed for cyber. This presentation examines the “Silver Bullets” of cybersecurity, lessons we can learn from that parallel history, and the essence of challenges that confront modern security practitioners.

    Teresa Merklin is a Fellow at Lockheed Martin where she specializes in Cyber Risk Assessment and Engineering for Cyber Resiliency. She is currently attached to the Aeronautics Cyber Range which performs cyber assessment and penetration testing across the complete portfolio of Lockheed Martin aircraft and related systems. She has 30+ years of career experience starting out in embedded software development which slowly morphed into cybersecurity over time. Teresa holds a BSEE from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, and an MBA from the University of Dallas. She holds the CISSP and CSSLP certifications.
  • 5G and Cyber Threats Aug 24 2021 6:00 pm UTC 60 mins
    Katie Grzywacz
    5G brings the power to connect billions of new devices and enable their use in new ways. With that comes significant risk. What types of threats does 5G introduce and what should we consider as we start incorporating 5G into our products?

    Katie Grzywacz is a Lockheed Martin Associate Fellow and is the chief cyber architect for the LM Space Centers of Excellence. She has 16+ years of experience that includes security engineering and offensive security testing. She is currently researching cyber threat scenarios that apply to a multitude of 5G use cases.
  • Developing the "Easy Button" for Security Services Recorded: Aug 5 2021 39 mins
    Rhonda Bricco
    Enterprise Security Front Office is the single point of entry for security-related questions or requests for service. A dedicated team is always ready to assist customers via an 800# or an internal request tool, making sure customers receive the best support. As the Front Office team is focused on providing a positive customer experience, they need to fully understand the request from potentially non-technical requestors.

    During this webinar, Rhonda will be talking about Developing the “Easy Button” for Security Services. She will share her insights and experiences as an Optum employee, working with several security teams, system owners and end-users building the Front Office. She will review opportunities, networking challenges and lessons learned working to master a global support model for security in a matrixed corporate environment.
  • Develop Cyber Genius with the Cyber Aptitude and Talent Assessment Recorded: Aug 4 2021 59 mins
    Doug Britton, Amy Cappellanti-Wolf & Dr. Mike Bunting
    Please join us in a panel discussion as we explore the challenges surrounding talent development in the cybersecurity industry from professional development, to recruiting, hiring, and building high-performing teams. Cyber Aptitude and Talent Assessment (CATA) identifies the cognitive overlap between aspiring individuals and master practitioners. Identifying that overlap allows for powerful predictions about future success in a variety of cybersec positions such as offensive, defensive, analytical/forensic, or design/development positions.

    You'll leave this talk with a deeper understanding of the scientific rigor that validates and sets the CATA tool apart, how CATA helps the individual cybersec professional (and anyone wishing to become a cyber sec pro) align their career decisions with their innate cyber aptitude, how human resource managers can streamline their talent pipeline, eliminate noise, and find the best possible candidates for their org, and how hiring managers can use CATA to cognitively fingerprint their highest performing teams and develop a talent mapping and succession plan.
  • Deciphering Trust in a Zero Trust World Recorded: Aug 3 2021 59 mins
    Karen ReinHardt
    What do Zero Trust and the move to the cloud really mean to organizations? How do you determine who and what to trust and when and where to trust them? What about perimeters, security zones, and networks? Does defense in depth still work? In this session, Karen Reinhardt, Systems Engineer Principle at the Home Depot, will cover how the cloud is pushing Zero Trust principles and what that can mean for traditional enterprise security, and how to approach the challenge of deciphering security and designing secure solutions in hybrid environments.
  • WiCyS Security Training Scholarship: The GRIT and the GLORY Recorded: Jul 8 2021 67 mins
    Scholarship Recipients
    Explore the journey of how 15 scholarship recipients with diverse backgrounds, cultures, ethnicities, locations, experiences, and more, joined forces in the WiCyS Security Training cohort and came out cyber champs ready for action. In this webinar, we will celebrate the grit and the glory of these soon-to-be-cybersecurity professionals. Join us to learn about the opportunities that lie ahead, the collective strength of the community, and what initiatives are underway that can impact your cybersecurity career trajectory!
  • Securing and Managing Risks Associated with the Supplier Ecosystem Recorded: Jun 29 2021 62 mins
    Hemma Prafullchandra and Hadley Edwards
    CEOs continue to rank risk management as one of their top business priorities, on par with innovation, efficiency, and productivity. In a world where there is no longer a perimeter, increasingly sophisticated threats are targeting other avenues to breach the organization across the applications, infrastructure, devices, and people they leverage from their suppliers (inclusive of vendors and third-party providers).

    As outsourcing for apps, infrastructure, devices, and human capital expands, the adoption of tools to monitor multiple tiers of suppliers for quality, security, integrity, and resilience risks is also growing, and the plethora of frameworks and approaches that organizations are leveraging today continues to grow in tandem. Additional complexity emerges when frameworks are applied inconsistently within an organization and across suppliers, or if multiple of frameworks are in play. This presentation aims to take an especially close look at the cyber/digital supply chain, identifying common challenges, potential approaches to manage supplier ecosystem risk, and emergent tech that will have an impact on supplier ecosystem management – for good or for ill.
  • AWS Recruiting Tips and Tricks Recorded: Jun 16 2021 61 mins
    AWS Team
    The AWS evolution has been driven by the spirit of innovation that is part of its DNA. The work environment is fast-paced and continually evolving, and every Amazonian is passionate about ownership and delivering results for the company. AWS strives to hire the brightest minds around the globe, and has various career opportunities. Thousands of candidates are interviewed every day for a range of jobs including technical, non-technical, security-focused, and other industry specializations. Join this webinar to learn what makes candidates stand out and how to prepare for an interview at AWS. You will hear from female members of the AWS Recruiting, AWS Security, and AWS Professional Services teams about interviewing at AWS and the career journeys that led them to AWS.

    Speakers:
    Ashley Shimer: Manager - AWS Recruiting
    Donna Dodson: Sr. Principal Scientist - AWS Security
    Alexis Robinson: Government Assessment Manager - AWS Security
    Michelle Bozman: Sr. Practice Manager - AWS Professional Services
    Sarah Currey: Security Consultant - AWS Professional Services
  • How to WOW Submission Reviewers with a Stellar Proposal Recorded: Jun 9 2021 61 mins
    Diana Kelley, Alyssa Miller, Chloe Messdaghi, Tennisha Martin
    So you want to showcase your skills and speak at a technical conference? Great. Your voice matters. Conference organizers highly value new voices, and they are always on the lookout for ways to bring more talent to the stage. The good news is that there are opportunities abound and by submitting to conferences, you're honing in on your expertise, experience and knowledge, creating the most stellar of proposals. Join us for an honest discussion of cybersecurity industry influencers who weren't always used to being accepted when they initially submitted for speaking opportunities. They will share their stories of how they transformed every "no" into a "YES"!
  • A Day in the life of SOC: Woman’s Perspective Recorded: Jun 3 2021 70 mins
    Amina Aggarwal (Workday)
    A security operations center (SOC) is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended by a team of information security professionals.

    This session will give you insight of a SOC from a woman's perspective. You will be taken through some of the challenges faced by many of us today while working in a male dominated field. By the end of this webinar, you will have learned about the day-to-day activities in a SOC, how to manage your work-life balance, and how to acquire the skills that will help you grow in this field.
  • Securing Artificial Intelligence Recorded: May 26 2021 60 mins
    Diya Wynn (Principal Consultant, AWS), Emily Soward (Data Scientist, AWS)
    Artificial Intelligence (AI) and Machine Learning (ML) can be found in every industry and almost every area of life. AI provides opportunities to tackle the most difficult problems and improve existing conditions in society. AI is expected to continue to fundamentally change industries and how we engage in the world. Companies, governments and individuals are struggling to keep up with the fast pace of change. Keeping up requires paying attention to advancements, reassessing processes and securing the technology. Securing AI is more than just protection against threats and potential vulnerabilities. It’s taking steps to ensure there is integrity, confidentiality, and reliability of systems throughout the entire lifecycle. And people are critical to the strategy. Their impact on data, algorithms, governance and operations cannot be ignored.
  • WiCyS Veterans' Apprenticeship Program Recorded: Apr 20 2021 60 mins
    Smoothstack Team
    WiCyS brings together women and supporters from around the world to develop cybersecurity skills with the aim of advancing women in, building equity in and developing minority talent in the field. One of WiCyS’s focuses is bridging the cybersecurity skills gap for female veterans, which is what helped launch the Veterans’ Program. Military career experience aligns well with a job in cybersecurity.

    The WiCyS Veterans’ Apprenticeship Program includes paid training and apprenticeship, secure long-term employment, and a litany of possible resources including access to technology and mentoring. This innovative apprenticeship model is DOL-certified and a top-notch gateway to get the support needed to enter into thriving cybersecurity careers. Join this webinar to learn more about the WiCyS Veterans' Apprenticeship Program and see if it's the right fit for YOU! And, as always... we thank you for your service.
  • WiCyS Veterans' Apprenticeship Program Recorded: Apr 8 2021 72 mins
    Smoothstack Team
    WiCyS brings together women and supporters from around the world to develop cybersecurity skills with the aim of advancing women in, building equity in and developing minority talent in the field. One of WiCyS’s focuses is bridging the cybersecurity skills gap for female veterans, which is what helped launch the Veterans’ Program. Military career experience aligns well with a job in cybersecurity.

    The WiCyS Veterans’ Apprenticeship Program includes paid training and apprenticeship, secure long-term employment, and a litany of possible resources including access to technology and mentoring. This innovative apprenticeship model is DOL-certified and a top-notch gateway to get the support needed to enter into thriving cybersecurity careers. Join this webinar to learn more about the WiCyS Veterans' Apprenticeship Program and see if it's the right fit for YOU! And, as always... we thank you for your service.
  • Cybersecurity Scholarships Through Cyber FastTrack Recorded: Mar 18 2021 26 mins
    Haya Arfat
    Come learn about Cyber FastTrack, an opportunity to earn scholarships and accelerate your career in cybersecurity, and gain access to free training materials.
  • SentinelOne's Woman Leaders: Top Insights that Have Guided their Careers Recorded: Mar 17 2021 61 mins
    SentinelOne Team
    Join SentinelOne's woman sales leaders as they share their top insights that have guided their business careers!
  • Who Changed my Lock? Keeping Pace with Identity and Access Management Recorded: Mar 4 2021 60 mins
    Sheetal Kanade (Workday), Shalmali Rajadhyax (Workday)
    Today, organizations worldwide are combating cybersecurity threats such as customer identity theft, account takeover and privacy abuse. The modern enterprise infrastructure is moving towards cloud technologies, its business model is becoming more global and is leveraging other cloud applications for some of its own business operations. In order to keep up with the growing sophistication of cyber security threats, organizations need prepare themselves by monitoring the technology advancements, following security trends and constantly evaluating and engaging in the opportunity to offer stronger product security to their customers. Join us to learn about the changing landscape of Customer Identity and Access Management and talk about some emerging concepts, all through an analogy to the story of "Who Moved My Cheese? - by Spencer Johnson, a parable about two little people and two mice in a maze, searching for new cheese, where each character represents a different attitude towards change.
  • Behind the Scenes of Target’s Cyber Fusion Center Recorded: Mar 4 2021 56 mins
    Target Team
    Target’s Cyber Fusion Center (CFC) teams operate 24x7 defending Target against cyber threats. The team uses a mix of human intelligence, analytics and state-of-the-art technology to detect, investigate, and contain cyber threats.

    Learn more about our CFC teams’ capabilities and what happens when they activate the war room as they walk through a high severity event.
  • Cybersecurity Scholarships Through Cyber FastTrack Recorded: Mar 3 2021 45 mins
    Haya Arfat
    Come learn about Cyber FastTrack, an opportunity to earn scholarships and accelerate your career in cybersecurity, and gain access to free training materials.
Advancing the mission of diversity in the cybersecurity workforce
Addressing diversity and talent shortages in cybersecurity through recruiting, retaining and advancing women in the field of cybersecurity, and improving on the very low 20-24% statistic of women in cybersecurity jobs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: NEURODIVERSITY – untapped talent that can help meet the cyber skills shortage
  • Live at: Oct 28 2020 6:00 pm
  • Presented by: Diane Delaney (IBM), Megan Roddie (IBM)
  • From:
Your email has been sent.
or close