[ This article was originally published here ]
What do all these webinars have in common? They feature women at the top of their cybersecurity game. March 8, 2023 is International Women’s Day, a focal point to recognize the achievements and contributions that women have made in every element of society.
The cybersecurity industry is fortunate to include women who are experts and visionaries who are changing our technologies and approaches for the better, as well as serving as role models to help encourage more women to pursue careers in the industry and achieve greater equality and balance. to the workforce.
Whether you want to delve deeper into one of your core domains or dive into an area you haven’t really explored to date, here is a selection of webinar sessions from our knowledge vault where women have shared their insights and experiences that They will help you learn. And thinking.
It’s never too late to get into cybersecurity, but taking the CISSP exam will certainly speed things up. This session doesn’t just give you tips on how to prepare for the test, what to expect on the day, and how to make the most of it afterwards. You’ll hear from Radhika Gopalan as she explains how he transitioned from a 25+ year career in software development to cybersecurity.
In this session, Lorri Janssen-Anessi, NSA veteran and director of external cybersecurity assessments at Blue Voyant, leads the conversation about how external cyber defense can help you move from a reactive to a proactive stance to thwart attacks on the Internet. source, especially giving it visibility beyond its authorizer.
Making quick fire decisions is usually a good thing in cybersecurity. But that same ability to make snap judgments based on limited information can lead to unconscious biases in decisions about hiring, promoting and developing people, and dealing with customers. In this three-part series, Suri Surinder, CEO and Lead DEI at CTR Factor, Inc. and Dwan Jones, Director, DEI at (ISC)2help participants understand, identify and ultimately manage their bias.
It is easy to decide to adopt zero trust. Implementing it is much more difficult and an iterative approach is often the more sustainable option. In this session, IANS Faculty Jennifer Minella details specific zero trust use cases spanning people, devices and applications, to help you play out your journey to zero trust maturity. She also talks about tools, considerations, and words of caution and recommendation.
There are many good reasons to embrace multicloud. The inevitable “delta” between each vendor’s native security capabilities is unlikely to be one of them. In this session, Sysdig’s Alba Ferri explains where native tools can fail, reveals a number of acronyms (CSPM, CNAPP, SQPP) and shows you what she needs to detect misconfigurations, excessive permissions, suspicious activity and more.
Tanya Janca from the IAN Faculty explains what the move to the cloud means for the security team’s workflows. In addition to outlining best practices when it comes to securing containers, serverless, and SaaS/PaaS/IaaS applications, she will talk about how to fit security into the development lifecycle to ensure every production application is as secure as possible. , and it should be.
The cyber skills gap isn’t just irritating. It is an issue of national strategic importance. In this session, Forrester Principal Analyst Heidi Shey joins Sharon Smith to discuss the key issues surrounding the cyber workforce. They cover certifications, the generation gap, and what diversity, equity, and inclusion means in the cybersecurity profession, as we all see profound demographic shifts in age, gender, rank, and ethnicity.