NACCSE Women in Cyber Technology Panel 2016

mechanical-gears-background-with-businesswomen_g12edjjo_l

I attend various cyber-security related events throughout the year so I can keep myself updated on the latest in the industry as well as keep up with colleagues and meet new people. The Netherlands American Chamber of Commerce South Eastern Region (http://www.naccse.org) has been organizing a series of panels regarding women in various industries – predominately technology and leading edge. This past panel – their 11th – was on “Women in Cyber Technology” and was held at L’Alliance Française in Atlanta, Georgia in August. The panel was co-hosted by the French American Chamber of Commerce – Atlanta (FACC-Atlanta) British-American Business Council of Georgia, GACC, and Women in Bio Atlanta. Panelists included: Marci McCarthy, CEO of T.E.N; Major Rodriguez Head of the Army Cyber School; Deborah Johns, Technology Recruiter; and the moderator Allison of Turner BCI Global.

The panel discussed issues related to being employed in the sector – what skills and training are required, what can women expect when working in the industry, why is the industry booming, and resources to help women get, maintain, and thrive in this male-dominated industry. Although they wanted to broaden their discussion on cyber technology, it quickly narrowed down to cyber-security, and for obvious reasons considering the recent headlines regarding personal, professional, and national threats due to online attacks.

Below I have listed some quotes and highlights from the panel as well as some of the resources shared by the panelists.

  • “In technology the salary is higher.”
  • “Cyber security is about priorities – you need to understand the risks and re-prioritize continuously.”
  • “What role models did you have while growing up? Did they look like you? Did you see yourself in that role?”
  • “Security clearances are an asset to your marketability – in and outside of the military.”
  • “Top concern on cyber security is the unknown threat because you do not know where it is coming from or sometimes when it has even hit.”
  • “Security professionals are paid to be paranoid.”
  • “To be successful in this field it is good to have a business acumen or business degree background – how is this going to affect my business.”
  • “There is no regular day in cyber security/cyber technology – an attack can happen 24/7.”
  • “You need to be a great communicator and have good relationships throughout the organization.”
  • “Build strong security awareness programs for your organization.”
  • “You need to have great knowledge of the security arena.”
  • “Remind people of cyber hygiene – like don’t click on an attachment or links.”
  • “The first CISO was Steve Katz at CISCO in 1999. We’ve come a long way since then.”
  • “This is a self-selected industry.”
  • “You need logic, to understand how things work.”
  • “Today everything runs off apps – and the more apps the more security issues you have.”
  • “This industry is taxing on your family – you need an understanding spouse.”
  • “There is high burnout – and you need to be comfortable that there may not be life-work balance.”
  • “You need an amazing tem around you.”
  • “The CISO is the James Bond of IT.”
  • “Always have a succession plan in place – a backup – or you will never get a break.”
  • “You need to be dedicated – you WILL work hard.”
  • “You don’t need to for some jobs in the field but it is good to learn to code – Udacity is a good resource. Think of it as learning another language – and knowing another language makes you more valuable.”
  • “You need to know about networking, technical aspects, encryption, governance, risk, and compliance.”

 

Key Information Security Organizations:

ISSA – http://www.issa.org

ISACA – https://www.isaca.org/Pages/default.aspx

ISC(2)- http://isc2.org

TAG Information Security Society – http://www.tagonline.org/chapters-and-societies/information-security/

ICMCP – https://icmcp.org

SANS – https://www.sans.org

 

Key publications and information sources:

SC Magazine – http://www.scmagazine.com

Dark Reading – http://www.darkreading.com

IT Security Planet – http://www.itsecurityplanet.com

Search Security by TechTarget – http://searchsecurity.techtarget.com

T.E.N. and ISE Programs Knowledgebase – http://www.ten-inc.com/knowledgebase.asp

 

Managing Online Risk’s Travel Security & Risk Recap (June 2016)

fireworks-display-series-57

Welcome to our recap of stories relating to Travel Security and Risk. This edition’s stories cover many issues including: how to book the safest hotel rooms; global travel safety updates; 5 simple security steps for travel; the business of travel security; Euro 2016 travel and safety tips; summertime travel security; and more.

Have a safe, secure, and fun holiday and summer season!

These are some of the articles, reports, posts, etc. that caught our attention this quarter. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. Some links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. For others you will need to go directly to our Twitter account to access. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

Managing Online Risk’s Monthly Recap (June 2016) – Stories Relating to Online Security & Risk

Fireworks

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: conversations business leaders need to have about security; digital patch kit against data leaks; is your social media hackable?; ransomware targeting Smart TVs; data security in the cloud; even Mark Zuckerberg got hacked; beyond backup for security; and more.

Have a safe, secure and fun 4th of July!

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • Looking forward to this: Lo And Behold: Reveries of the Connected World – Official Trailer
  • Conversations business leaders need to have about security
  • 9 Critical GDPR Questions Answered by 3 Data Privacy & Security Experts
  • Data security trends in business, law ‪http://ow.ly/CkZF301Nfu3 
  • Digital patch kit: How to protect yourself from data leaks
  • A Storm Brews: Retailers Push Back Against Payment Card Industry Data Security Standards
  • FTC closes 70 percent of data security investigations ‪http://ow.ly/aTET301Ltwr 
  • Legal Bits & Business Bytes Monthly Lunch-n-Learn ‪http://ow.ly/PTMD301JksS 
  • BYOD can pose privacy risks to employees
  • Gartner’s top 10 security predictions
  • 5 Tips For Making Data Privacy Part Of The Company’s Culture
  • 5 data security questions smart city planners need to ask
  • 10 Data Security Mistakes Startups Can’t Afford to Make
  • Is Your Social Media Account Hackable? ‪http://ow.ly/jQwc301yz9l 
  • Executive Issues on Social Media
  • Recent changes to states’ data security laws | Lexology ‪http://ow.ly/apkg301w545 
  • The Always-On Culture + Mobile Access = IT Nightmare?
  • 5 Steps To Securing Yourself From Online Identity Theft ‪http://ow.ly/LxQv301tz1k 
  • Views on Encryption, Data Security Portrayal in TV Shows From ‘Mr. Robot’ Writer ‪http://ow.ly/zStz301tyLe 
  • Mobile ID At The 2016 Gartner Security and Risk Management Summit
  • Beware, this ransomware is seeking to target your Smart TVs
  • What’s Your Move? The Big Consideration for Data Security
  • Internet Security, AntiVirus, AntiSpam, AntiSpyware Quiz ‪http://ow.ly/7RNY301koI9 
  • Attorney General offers summer tips for online safety and security
  • 5 Ways to Defuse Data Threat from Departing Employees – eSecurity Planet ‪http://ow.ly/1Dfk301iL6R 
  • Negligence, not malice, the biggest threat to law firm data security
  • Legal Insider: New Social Media Policy for Security Clearance Investigations ‪http://ow.ly/Eybx301iKDx 
  • The Car Hacker’s Handbook digs into automotive data security ‪http://ow.ly/xSFW301hCEL 
  • Biggest Attacks Of 2016 (So Far)
  • 7 Data Classification Tips
  • When An Employee Leaves Your Agency, Make Sure Your Data Doesn’t
  • A Russian Cybersleuth Battles the ‘Dark Ages’ of the Internet
  • 10 Ways to Protect Social Media Passwords From Hackers
  • Facebook Messenger flaw revealed – CSO ‪http://ow.ly/Uppp30132Lg 
  • Data Security and the Insider Threat | Lexology ‪http://ow.ly/sdVp3012V5f 
  • Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk
  • 100 million social media accounts hacked, up for sale on dark web marketplace ‪http://ow.ly/jlYk3010aFT 
  • Even ‘Dead’ Social Media Sites Are a Gold Mine for Hackers ‪http://ow.ly/hkk43010aB6 
  • Cloudy Skies — Data Security in the Cloud [Infographic] ‪http://ow.ly/ragu3010aq4 
  • 4 Must-Follow Steps for Storing Client Data ‪http://ow.ly/3igy3010agA 
  • Even Mark Zuckerberg Got Hacked: Here’s a Basic Internet Security Mistake to Avoid
  • Law2sm’s Monthly Recap 06/01/16 – Stories Relating to Social Media & the Law ‪http://ow.ly/Es8s300YOTZ 
  • Biometrics technology is reshaping the landscape of the security industry ‪http://ow.ly/omg9300Xods 
  • National Security in a Data Age ‪http://ow.ly/lk7c300Xo7I 
  • Why legal departments begrudge the cloud
  • Obama Administration Releases Final Data Security Policy Principles & Framework ‪http://ow.ly/YzTB300Wf5V 
  • The Art of Intelligent Deception in Cyber Security ‪http://ow.ly/zqaK300Wf3L 
  • How to Protect Your Small Business as Cybersecurity Threats Rise
  • How to delete your smartphone data securely before selling your device
  • Millennials & Mobile Payments: What is the Price of Convenience?
  • Myth 8: data privacy & security law compliance is the provider’s responsibility ‪http://ow.ly/hjG8300SKlE 
  • 4 Effective Data Security Tips for Small Business ‪http://ow.ly/l6WE300SKik 
  • Can 2FA and biometric security be adopted for verification
  • The CSO 2016 Security Data Analytics Survival Guide
  • Security concerns rising for Internet of Things devices
  • Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance 2016
  • Going out of business: An important, but forgotten security precaution
  • Beyond Backup: The Role of Security and Privacy in Data Protection ‪http://ow.ly/k2Sk300Nut6 

Data security is the most significant risk facing in-house counsel today ‪http://ow.ly/JVRt300NupW 

Managing Online Risk’s Monthly Recap (May 2016) – Stories Relating to Online Security & Risk

Virus Trojan Spyware Signpost Showing Internet Or Computer Threats

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: alleviate top stressors in IT systems; 6 stages of incidence response; the role of online security insurance; is biometric data private; mobile security challenges; crafting a winning risk assessment; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a monthly recap. Some have links that will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Others you need to go directly to our Twitter account to view. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • What Is the Future of Mobile App Development? – DZone Mobile
  • Australia to auction seized Bitcoins – CSO ‪http://ow.ly/4t9d300KAEb 
  • How to Alleviate the 15 Top Stressors in IT Systems
  • Millennials Could Learn From Baby Boomers When It Comes To Security ‪http://ow.ly/d5Zv300Ec8p 
  • Social Media Compliance a Challenge for Enterprises
  • Clone Kimber new book: Legal Guidelines for Employers and Employees Dealing with CyberLaw Issues ‪http://ow.ly/WMtJ300zB9P 
  • Recommendations for Evaluating Your Organization’s Use of Social Media ‪http://ow.ly/CH5R300zdlE 
  • The Six Stages of Incident Response ‪http://ow.ly/irv2300zd6h 
  • What is Email Security? Data Protection 101 ‪http://ow.ly/DbQk300wvBo 
  • The role of online security insurance in business ‪http://ow.ly/VffN300wvry 
  • Google Innovates Online Security Measure, No More Passwords By The End Of This Year
  • How Should Companies Handle Data From Employees’ Wearable Devices? ‪http://ow.ly/OfCq300ufda 
  • Social Media: The Digital Footprint to Fraud ‪http://ow.ly/Ajr5300qldR 
  • Are YOU Hiring Robots Yet? | Global Sales Growth
  • 5 Essential Steps To Take After A Data Security Breach ‪http://ow.ly/3Ld7300pysu 
  • 10 Mobile Security Vulnerabilities and How to Address Them
  • Five Resources to Help You Deploy an Effective Mobile Security Strategy
  • Why a staggering number of Americans have stopped using the Internet the way they used to
  • Biometric data: security and ease negate passwords, but is it private?
  • Data security mistakes to avoid at all costs
  • Social Media Posts Now Fair Game in Security Clearance Process
  • Security through the entire life cycle
  • How to protect your business from 5 big data security threats
  • Report: Security and Privacy Fears Can Affect Internet Use
  • Industry Associations Publish Principles on International Cyber Security, Data & Technology
  • Mobile Security Challenges: You’re Not Alone
  • Mobile security updates are a mess. The FCC and FTC want to know why.
  • Almost half of companies don’t teach staff data security
  • When Twitter Cut Off The US Intelligence Community: Social Media And Surveillance
  • Social Media Crisis Management: How to Prepare and Execute a Plan
  • 9 Important Elements to Corporate Data Security Policies that Protect Data Privacy
  • Social Media: Things You Might Not Have Thought About
  • Russian Hacker Trades Millions of Stolen Records for Social Media Likes
  • 7 Password Experts on How to Lock Down Your Online Security
  • FFIEC Releases Guidance on Risk Management for Mobile Financial Services ‪http://ow.ly/ulPV3000Hk9 
  • We Tested 50+ Free Security Tools so You can Use Them for Your Online Protection
  • Warning issued over fake online ads for puppies and kittens
  • Rethinking security for the Internet of Things ‪http://ow.ly/m9VX3000H2t 
  • Continuing Data Security Lessons from the SEC | JD Supra
  • Five most common myths about Web security
  • Building the Case for Law Firm Data Security (Infographic)
  • Analytics, Predictive Insight and Agility Can Stop Data Breaches Before They Begin
  • IoUC’s Monthly Recap (Apr. 2016) – Stories Relating to the Internet of Unintended Consequences ‪http://ow.ly/4nnVV8 
  • Managing Online Risk’s Monthly Recap (Apr. 2016) – Stories Relating to Online Security & Risk
  • Law2sm Monthly Recap: Social Media & the Law 5/1/16 ‪http://ow.ly/4nnEU7 
  • Using Data To Secure Networks: Optimizing Individual Privacy While Achieving Strong Security ‪http://ow.ly/4nmB9Q 
  • Cybersecurity Insurance: Facing Hidden Risks and Uncertainty
  • Five Common Mobile App Security Vulnerabilities And How to Fix Them
  • Technology in Focus: Monetizing the Internet of Security Things ‪http://ow.ly/4nk7dA 
  • Craft a winning risk assessment analysis in five steps

Managing Online Risk’s Monthly Recap (Apr. 2016) – Stories Relating to Online Security & Risk

cloud-weather-tiny-app-icon_MkGqJALu_L

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: data protection developments for the insurance & healthcare industries; 7 smart practices for smart devices; data security risks from a CISO perspective; EU passes data security laws; the 1st 24 hours of a security breach; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.