It’s fair to say that Kristin Lovejoy understands IBM’s information security approach inside and out, largely because she helped shape both the corporation’s internal and customer-facing infosec strategy.
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They’re all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.
Becky is one of 10 women selected for their longstanding contributions to the IT security space. As veterans in the field, they’ve served as exemplary women taking on leadership roles in the community. We celebrate by offering their stories as well as testimonials from colleagues who have been inspired by them.
Though plenty of work remains to be done in closing the industry’s gender gap, this inaugural issue of SC Magazine takes the step of highlighting women for their noteworthy contributions to the IT security and privacy space.