Women In Security 2014
As chief policy officer of HackerOne, Katie Moussouris oversees the company's philosophy and approach to vulnerability disclosure, advises customers and researchers, and as she puts it, "works toward the public good to legitimize and promote security research to help make the internet safer for everyone."
As both the CTO and the SVP for products at HyTrust, as well as more recently its head of engineering and CISO, Hemma Prafullchandra is also "an evangelist for what's possible."
As VP and CISO at Freddie Mac, Patricia Titus is responsible for the protection and integrity of the mortgage company's information assets while enabling world-class information access.
These seven women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.
Here's a list of five notable women to watch who have had a positive impact on the information security industry.
We asked a number of security professionals what they thought about the conditions for women in the IT security workplace today.
Targeted events help stake out space for women in the security field, reports Alan Earls.
Women bring new skill sets, but early encouragement, training in grade school and mentoring are all needed to succeed, reports James Hale.
Harassment has no place in the security industry. Neither do sexism or discrimination. But, there they are. It's time for infosec to just say no, reports Teri Robinson.
Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.
Though plenty of work remains to be done in closing the industry's gender gap, this inaugural issue of SC Magazine takes the step of highlighting women for their noteworthy contributions to the IT security and privacy space.
Becky is one of 10 women selected for their longstanding contributions to the IT security space. As veterans in the field, they've served as exemplary women taking on leadership roles in the community. We celebrate by offering their stories as well as testimonials from colleagues who have been inspired by them.
Debates about the dearth of women in IT security and, well, a lack of diversity in the field overall, seem to be edging our space closer and closer to some sort of tipping point.
Lisa Foreman has made it her mission to ensure that more women and girls not only enter the information security field, but feel at home there.
When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve out new territory because her position had never existed at the corporate level before.
It's fair to say that Kristin Lovejoy understands IBM's information security approach inside and out, largely because she helped shape both the corporation's internal and customer-facing infosec strategy.
Jennifer Minella grew up in the shadow of the company she now helps run.
When the White House decided to take a stand on cybersecurity for the critical infrastructure of the country, it was Samara Moore who helped guide the planning and implementation of their efforts.
In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many different areas, with a heavy focus on application security, security services and threat intelligence.
Sign up to our newsletters
SC Magazine Articles
- U.S. spy program targeting Americans' mobile phones, report says
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context