SlideShare a Scribd company logo
1 of 17
Calling All Women:
The Cybersecurity Field
Needs You!
WOC 1405
A.D. Williams
“…head, heart and humor…” is the simplistic manner Adrienne (A.D.) Williams
describes herself. A.D. continues to say I know who I am and from what beginnings I
have come from: …a resilient, intelligent, humble, teachable, responsible,
courteous, respectful child of GOD! I believe the simplest description was quoted by
Maya Angelo… a Phenomenal Woman!
Adrienne is a Functional Systems Engineering Manager for Northrop Grumman (NGC)
directly supporting next generation system security solutions development
supporting various embedded platforms to offer cyber and Anti-Tamper protection.
Previous assignments supported domestic development and international radar
programs as Deputy SEIT and IPT roles. In addition, she serves as a functional
manager to direct engineering reports supporting as many as 20 development and 4
international programs. Adrienne began her tenure at NGC in 2009 as a Program
Manager supporting 2 programs within the Naval Business Area.
Adrienne pursued her Bachelors of Science in Aeronautical Science at Embry-Riddle
Aeronautical University while concurrently serving honorably in the United States Air
Force supporting Tactical and Strategic Airframes Avionic, Electronic
Countermeasures and Air Traffic Management. In addition, she earned her Project
Management Professional (PMP) certification from Project Management Institute.
Upon separation as an active service member, she continued her service in the US Air
Force as an active reservist participating in the most recent campaigns such as
Operation Iraqi Freedom and Operation Enduring Freedom-Afghanistan.
Concurrent to serving as a reservist, Adrienne joined United Parcel Service (UPS)
Airlines as a Program Engineering Manager with responsibilities of 30 CONUS and
Mexico Air Operations. Adrienne’s organizational leadership and logistics
management expertise was pivotal as a lead for the post acquisition team of Menlo
Worldwide Logistics consisting of 8,200 employees and operations in 175 countries.
Adrienne has been a winner of numerous Premium Performer Awards for individual
and team contributions from the U.S. Air Force and Northrop Grumman to include
Women of Color Management Leadership
Adrienne’s daily mantra to pursue her highest heights despite gender and ethnicity in
any area of her life is “Well-Behaved Women Seldom Make History” – Laurel Thatcher
Ulrich
Dayatra Rivette
Dayatra Rivette is the Information Security Officer and Privacy Lead for
Lockheed Martin Rotary and Mission Systems. Rotary and Mission Systems
(RMS) provides systems engineering, software development, training
solutions and complex program management for global security, civil and
commercial markets. Simply stated, our mission is to be the world’s
leading global security and aerospace company. To achieve this mission,
RMS draws on its core capabilities in advanced platforms and weapons,
C4ISR, global sustainment, training and sensors.
As the Information Security Officer and Privacy Lead, Ms. Rivette has
oversight and accountability for RMS Cyber Security and Privacy affairs
supporting more than 34,000 employees in more than 1,000 programs at
locations across the U.S. and around the world. In this capacity, Ms.
Rivette is chartered with developing cyber strategy, IT risk mitigation and
securely enabling capabilities for RMS programs and lines of business. Ms.
Rivette is responsible for working with Corporate Information Security
(CIS) and functional stakeholders to ensure RMS systems are managed
consistent with enterprise tolerance for risk.
Ms. Rivette has over 13 years of experience in information technology
and has led enterprise efforts in information security, business
intelligence, security engineering, and supply chain security.
She hold a Bachelors of Science Degree in Management/Management
Information Systems from Rensselaer Polytechnic Institute.
Felicia Jackson
Felicia Jackson is a senior computer system security technologist at Raytheon
Missile Systems (RMS) in Tucson, Arizona. Raytheon Company (NYSE: RTN),
with 2016 sales of $24 billion and 63,000 employees worldwide, is a
technology and innovation leader specializing in defense, civil government
and cybersecurity solutions.
In her current role, she is part of a specially trained group that works with
programs to ensure their cyber systems are in compliance with Defense
Federal Acquisition Regulation Supplement regulations. Jackson joined RMS in
2007 as an Information Assurance technician, providing IA oversight and
support for 12,500 people over a variety programs. In this role, she directly
contributed to RMS receiving five consecutive Superior ratings between 2010
and 2014 from the Defense Security Service. In 2015, Jackson was
instrumental in Raytheon’s selection for the coveted Cogswell Award,
presented to organizations that demonstrate the highest standards of network
and systems security.
Before working at Raytheon, Jackson served 24 years in the U.S. Air Force,
retiring as an enlisted Master sergeant, and as the Chief of Information
Assurance at Royal Air Force Base in Mildenhall, UK. Her worldwide overseas
assignments and tours include Spain, UK, Korea, Japan, Italy, Turkey, Africa,
Germany, and Qatar to provide directed support to many military campaigns.
In 2017, Jackson led the planning and hosted a workshop at the 2017 Women
in Cybersecurity conference.
She holds a Bachelor’s of Science in Business Management, and a Master’s of
Business Administration, both from the University of Phoenix.
Colonel Maria Biank
Maria Biank is the Director of Operations for U.S. Army Cyber Command.
Army Cyber Command is charged with maintaining and defending the Army
network consisting of over 1 million endpoints. Additionally, Soldiers conduct
offensive and defensive operations in cyberspace to keep our country and its
allies safe.
Colonel Biank is the Chief Operations Officer of the organization and oversees
a diverse staff of over 200 Soldier and Department of the Army civilians who
plan and prepare operations for Army Cyber Command. The command,
established in 2010, is headquartered at Fort Belvoir, VA. In the next five
years the organization will move to Fort Gordon near Augusta, Georgia.
Colonel Biank grew up in a military family. She has served as a career Army
Signal officer for 27 years. Her assignments include time in North Carolina,
Germany, Korea, Georgia, Maryland and Virginia. She commanded at the
Brigade level an organization responsible for maintaining the Army networks
in the eastern continental United States. Her experience includes three
combat tours Iraq and humanitarian response missions during the aftermath
of Hurricanes Katrina, Rita and Sandy.
She holds a Bachelors of Arts in History from the College of William and Mary
a Masters in Military History from the Command and General Staff College and
a Masters Degree in National Resource Strategy from the Industrial College of
the Armed Forces at the National Defense University.
Why is this important?
“the threat is real;
we need you!”
“network defense”
“pace is
critical”
“…unprecedented hack of
Ukraine’s power grid”
“[Sony Pictures Entertainment] should
Have been able to protect itself”
“monstrous cyberattack on Saudi Aramco”
“Russian Hacking during the
2016 Election”
“JP Morgan Chase
Hacking effects 76 million households”
“attacking the human vulnerability”
“counter, kill, clone”
“…lock down your money after
Equifax
cyber breach”
“social media is the adversary’s
playground”
“Targetfailed to act on warning signs…major breach was imminent”
“WannaCry Ransomware…
worldwide cyberattack”
Female
workforce in
Cybersecurity
Unfilled jobs
in
Cybersecurity
Demand for
talent by
2019
Job postings
in past 5 years
Cybersecurity
market by
2020
World and US
population is
women
209K >6M
50%$170B
11%
74%
“Cybersecurity has a
gender problem;
you are the solution!”
Reasons to consider cybersecurity
What’s in it for you?
•Lead
SW
Engineer
~$233K
•Chief
Security
Officer
•~$225k
•CISO
•~$192K
•Securit
y
Consult.
•~$199K
Job Security
High Starting Salaries
Scholarships
Diversity
Impact
Average starting salary with B.S.
Degree $115K
Natural qualities of women
1. Calmness
2. Fairness
3. Intuition
4. Compassion
5. Intelligence
6. Flexibility
7. Confidence
8. Courage
9. Decisiveness
10. Detailed
Opportunities abound!
10
“…where will your
cybersecurity journey take
you?”
Personal Cyber Protection
Scholarships and Incentives for Women
 The SANS CyberTalent Women’s Immersion Academy
 The Women’s Society of Cyberjutsu (WSC)
 Women in Cybersecurity
 The National Initiative for Cybersecurity Careers and Studies
 For a comprehensive list visit the NICCS Women and Minorities Webpage.
Resources
Women Working Dare to Live Fully: www.womenworking.com
Center for Cyber Safety and Education: www.iamcybersafe.org
SANS Cyber Talent Immersion Academy for Women:
https://www.sans.org/cybertalent/immersion-academy#womens-academy
eBook: Everything You Need to Know About a Career in Cyber Security:
https://onlinedegrees.sandiego.edu/ebook-everything-need-know-career-cyber-
security/
eBook: The Diversity Advantage: Fixing Gender Inequality in the Workplace on
Amazon
FREE NYU High School STEM Summer Program for Female Students:
http://engineering.nyu.edu/k12stem/cs4cs/
The Women Society of Cyberjutsu: http://womenscyberjutsu.org/
Women in Cyber Security (WiCyS): https://www.csc.tntech.edu/wicys/
Moderator Adrienne (A.D.) Williams, PMP
Systems Engineer Manager
Northrop Grumman
Adrienne.Williams@ngc.com
Panelist
Dayatra Rivette
Information Security Officer
and Privacy Lead
Lockheed Martin Corp
Dayatra.l.rivette@lmco.com
Panelist
Colonel Maria Biank
US Army Cyber Command,
G3
Maria.a.biank.mil@mail.mil
Panelist
Felicia Jackson
Senior Computer System Security
Technologist
Raytheon Mission Systems
Felicia.jackson@raytheon.com
Your Questions?
14
“Our deepest fear is not that we are inadequate. Our
deepest fear is that we are powerful beyond measure.
…We ask ourselves, Who am I to be brilliant, gorgeous,
talented, fabulous?
Actually, who are you not to be? …
…as we let our own light shine, we unconsciously give other
people permission to do the same. As we are liberated from
our own fear, our presence automatically liberates others.”
Marianne Williamson
15
16
Moderator Panel Questions
<<DO NOT KEEP IN THE DECK>>
1. The cyber threat landscape continues to evolve and becomes more complex
as time passes, how do you find work/life balance in a career like this?
2. What are the skillsets that are vital to a career in cybersecurity; both
technical and soft skills?
3. What keeps you up at night? How have you effected change?
4. What does a cybersecurity career path look like? Then what?

More Related Content

What's hot

No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
2019 TrustCom: The role of ML and AI in Security
2019 TrustCom: The role of ML and AI in Security2019 TrustCom: The role of ML and AI in Security
2019 TrustCom: The role of ML and AI in SecurityJonathanOliver26
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT PresentationDaniel McGarvey
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat ReportChris Hewitt
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!Dottie Schindlinger
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 

What's hot (9)

No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
2019 TrustCom: The role of ML and AI in Security
2019 TrustCom: The role of ML and AI in Security2019 TrustCom: The role of ML and AI in Security
2019 TrustCom: The role of ML and AI in Security
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT Presentation
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
 
DYN_May-June2015_FINAL_v2
DYN_May-June2015_FINAL_v2DYN_May-June2015_FINAL_v2
DYN_May-June2015_FINAL_v2
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 

Similar to Calling All Women: The Cyber Security Field Needs You!

CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCapitolTechU
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfCIO Look Magazine
 
UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day ProgramTroy Thompson
 
The Business of Cybersecurity: Impacting information management
The Business of Cybersecurity: Impacting information managementThe Business of Cybersecurity: Impacting information management
The Business of Cybersecurity: Impacting information managementCareer Communications Group
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Hospitality Security and Safety Solutions
Hospitality Security and Safety SolutionsHospitality Security and Safety Solutions
Hospitality Security and Safety Solutionspfarina
 
The Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfThe Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfthesiliconleaders
 
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsFernando Blasco
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTopCyberNewsMAGAZINE
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityCareer Communications Group
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity MarketingAlex Weishaupt
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemSecurityStudio
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceVeriato
 

Similar to Calling All Women: The Cyber Security Field Needs You! (20)

CWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptxCWC FiresideChat Slides.pptx
CWC FiresideChat Slides.pptx
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdf
 
UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day Program
 
The Business of Cybersecurity: Impacting information management
The Business of Cybersecurity: Impacting information managementThe Business of Cybersecurity: Impacting information management
The Business of Cybersecurity: Impacting information management
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Hospitality Security and Safety Solutions
Hospitality Security and Safety SolutionsHospitality Security and Safety Solutions
Hospitality Security and Safety Solutions
 
The Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdfThe Most Impactful Women in Cybersecurity For 2024.pdf
The Most Impactful Women in Cybersecurity For 2024.pdf
 
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
 
Ciso NYC
Ciso NYCCiso NYC
Ciso NYC
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in Cybersecurity
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
 

More from Career Communications Group

Technology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowTechnology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowCareer Communications Group
 
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Career Communications Group
 
Power Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersPower Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersCareer Communications Group
 
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Career Communications Group
 
The Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessThe Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessCareer Communications Group
 
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsWomen in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsCareer Communications Group
 
Mental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionMental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionCareer Communications Group
 
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureImprovising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureCareer Communications Group
 
Authenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderAuthenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderCareer Communications Group
 
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolEmbracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolCareer Communications Group
 
DEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityDEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityCareer Communications Group
 
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceSpeak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceCareer Communications Group
 
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessIntroverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessCareer Communications Group
 
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Career Communications Group
 
Communication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCommunication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCareer Communications Group
 
Building Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceBuilding Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceCareer Communications Group
 

More from Career Communications Group (20)

Technology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should KnowTechnology Trends Every STEM Manager Should Know
Technology Trends Every STEM Manager Should Know
 
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
Unleashing Your Authentic Voice: Building Confidence and Discovering Your Tru...
 
Power Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-ManagersPower Up Your Performance: Essential Skills for Non-Managers
Power Up Your Performance: Essential Skills for Non-Managers
 
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
Keep the Fire Burning: Connecting Values, Identity, and Passion to Avoid Burn...
 
The Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding HappinessThe Golden Rules for Achieving Your Goals and Finding Happiness
The Golden Rules for Achieving Your Goals and Finding Happiness
 
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation SkillsWomen in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
Women in Leadership: Enhancing Confidence, Communication, and Negotiation Skills
 
Mental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and InclusionMental Health in the Era of Diversity and Inclusion
Mental Health in the Era of Diversity and Inclusion
 
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under PressureImprovising With Confidence: Learning to Speak Eloquently Under Pressure
Improvising With Confidence: Learning to Speak Eloquently Under Pressure
 
Authenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a LeaderAuthenticity: Embracing Your True Self as a Leader
Authenticity: Embracing Your True Self as a Leader
 
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent PoolEmbracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
Embracing Neurodiversity in the Workplace: Unlocking a Diverse Talent Pool
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
X-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar ResumeX-treme Resumes: Constructing a Stellar Resume
X-treme Resumes: Constructing a Stellar Resume
 
DEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a RealityDEI Ambassadors: Making a Diverse Workplace a Reality
DEI Ambassadors: Making a Diverse Workplace a Reality
 
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the WorkplaceSpeak Up and Stand Out: Assertiveness Skills for Women in the Workplace
Speak Up and Stand Out: Assertiveness Skills for Women in the Workplace
 
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership SuccessIntroverts as Leaders: Harnessing Quiet Power for Leadership Success
Introverts as Leaders: Harnessing Quiet Power for Leadership Success
 
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
Managing Emotional Tension: Strategies for Navigating Personality Disagreemen...
 
Communication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive PeopleCommunication Strategies for Engaging Highly Sensitive People
Communication Strategies for Engaging Highly Sensitive People
 
How Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the WorkplaceHow Chat GPT and AI Will Impact the Workplace
How Chat GPT and AI Will Impact the Workplace
 
Building Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting PerformanceBuilding Resilience: Strategies for Managing Stress and Boosting Performance
Building Resilience: Strategies for Managing Stress and Boosting Performance
 
Interview Skill That Get you Hired
Interview Skill That Get you HiredInterview Skill That Get you Hired
Interview Skill That Get you Hired
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Calling All Women: The Cyber Security Field Needs You!

  • 1. Calling All Women: The Cybersecurity Field Needs You! WOC 1405
  • 2. A.D. Williams “…head, heart and humor…” is the simplistic manner Adrienne (A.D.) Williams describes herself. A.D. continues to say I know who I am and from what beginnings I have come from: …a resilient, intelligent, humble, teachable, responsible, courteous, respectful child of GOD! I believe the simplest description was quoted by Maya Angelo… a Phenomenal Woman! Adrienne is a Functional Systems Engineering Manager for Northrop Grumman (NGC) directly supporting next generation system security solutions development supporting various embedded platforms to offer cyber and Anti-Tamper protection. Previous assignments supported domestic development and international radar programs as Deputy SEIT and IPT roles. In addition, she serves as a functional manager to direct engineering reports supporting as many as 20 development and 4 international programs. Adrienne began her tenure at NGC in 2009 as a Program Manager supporting 2 programs within the Naval Business Area. Adrienne pursued her Bachelors of Science in Aeronautical Science at Embry-Riddle Aeronautical University while concurrently serving honorably in the United States Air Force supporting Tactical and Strategic Airframes Avionic, Electronic Countermeasures and Air Traffic Management. In addition, she earned her Project Management Professional (PMP) certification from Project Management Institute. Upon separation as an active service member, she continued her service in the US Air Force as an active reservist participating in the most recent campaigns such as Operation Iraqi Freedom and Operation Enduring Freedom-Afghanistan. Concurrent to serving as a reservist, Adrienne joined United Parcel Service (UPS) Airlines as a Program Engineering Manager with responsibilities of 30 CONUS and Mexico Air Operations. Adrienne’s organizational leadership and logistics management expertise was pivotal as a lead for the post acquisition team of Menlo Worldwide Logistics consisting of 8,200 employees and operations in 175 countries. Adrienne has been a winner of numerous Premium Performer Awards for individual and team contributions from the U.S. Air Force and Northrop Grumman to include Women of Color Management Leadership Adrienne’s daily mantra to pursue her highest heights despite gender and ethnicity in any area of her life is “Well-Behaved Women Seldom Make History” – Laurel Thatcher Ulrich
  • 3. Dayatra Rivette Dayatra Rivette is the Information Security Officer and Privacy Lead for Lockheed Martin Rotary and Mission Systems. Rotary and Mission Systems (RMS) provides systems engineering, software development, training solutions and complex program management for global security, civil and commercial markets. Simply stated, our mission is to be the world’s leading global security and aerospace company. To achieve this mission, RMS draws on its core capabilities in advanced platforms and weapons, C4ISR, global sustainment, training and sensors. As the Information Security Officer and Privacy Lead, Ms. Rivette has oversight and accountability for RMS Cyber Security and Privacy affairs supporting more than 34,000 employees in more than 1,000 programs at locations across the U.S. and around the world. In this capacity, Ms. Rivette is chartered with developing cyber strategy, IT risk mitigation and securely enabling capabilities for RMS programs and lines of business. Ms. Rivette is responsible for working with Corporate Information Security (CIS) and functional stakeholders to ensure RMS systems are managed consistent with enterprise tolerance for risk. Ms. Rivette has over 13 years of experience in information technology and has led enterprise efforts in information security, business intelligence, security engineering, and supply chain security. She hold a Bachelors of Science Degree in Management/Management Information Systems from Rensselaer Polytechnic Institute.
  • 4. Felicia Jackson Felicia Jackson is a senior computer system security technologist at Raytheon Missile Systems (RMS) in Tucson, Arizona. Raytheon Company (NYSE: RTN), with 2016 sales of $24 billion and 63,000 employees worldwide, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. In her current role, she is part of a specially trained group that works with programs to ensure their cyber systems are in compliance with Defense Federal Acquisition Regulation Supplement regulations. Jackson joined RMS in 2007 as an Information Assurance technician, providing IA oversight and support for 12,500 people over a variety programs. In this role, she directly contributed to RMS receiving five consecutive Superior ratings between 2010 and 2014 from the Defense Security Service. In 2015, Jackson was instrumental in Raytheon’s selection for the coveted Cogswell Award, presented to organizations that demonstrate the highest standards of network and systems security. Before working at Raytheon, Jackson served 24 years in the U.S. Air Force, retiring as an enlisted Master sergeant, and as the Chief of Information Assurance at Royal Air Force Base in Mildenhall, UK. Her worldwide overseas assignments and tours include Spain, UK, Korea, Japan, Italy, Turkey, Africa, Germany, and Qatar to provide directed support to many military campaigns. In 2017, Jackson led the planning and hosted a workshop at the 2017 Women in Cybersecurity conference. She holds a Bachelor’s of Science in Business Management, and a Master’s of Business Administration, both from the University of Phoenix.
  • 5. Colonel Maria Biank Maria Biank is the Director of Operations for U.S. Army Cyber Command. Army Cyber Command is charged with maintaining and defending the Army network consisting of over 1 million endpoints. Additionally, Soldiers conduct offensive and defensive operations in cyberspace to keep our country and its allies safe. Colonel Biank is the Chief Operations Officer of the organization and oversees a diverse staff of over 200 Soldier and Department of the Army civilians who plan and prepare operations for Army Cyber Command. The command, established in 2010, is headquartered at Fort Belvoir, VA. In the next five years the organization will move to Fort Gordon near Augusta, Georgia. Colonel Biank grew up in a military family. She has served as a career Army Signal officer for 27 years. Her assignments include time in North Carolina, Germany, Korea, Georgia, Maryland and Virginia. She commanded at the Brigade level an organization responsible for maintaining the Army networks in the eastern continental United States. Her experience includes three combat tours Iraq and humanitarian response missions during the aftermath of Hurricanes Katrina, Rita and Sandy. She holds a Bachelors of Arts in History from the College of William and Mary a Masters in Military History from the Command and General Staff College and a Masters Degree in National Resource Strategy from the Industrial College of the Armed Forces at the National Defense University.
  • 6. Why is this important? “the threat is real; we need you!” “network defense” “pace is critical” “…unprecedented hack of Ukraine’s power grid” “[Sony Pictures Entertainment] should Have been able to protect itself” “monstrous cyberattack on Saudi Aramco” “Russian Hacking during the 2016 Election” “JP Morgan Chase Hacking effects 76 million households” “attacking the human vulnerability” “counter, kill, clone” “…lock down your money after Equifax cyber breach” “social media is the adversary’s playground” “Targetfailed to act on warning signs…major breach was imminent” “WannaCry Ransomware… worldwide cyberattack”
  • 7. Female workforce in Cybersecurity Unfilled jobs in Cybersecurity Demand for talent by 2019 Job postings in past 5 years Cybersecurity market by 2020 World and US population is women 209K >6M 50%$170B 11% 74% “Cybersecurity has a gender problem; you are the solution!” Reasons to consider cybersecurity
  • 8. What’s in it for you? •Lead SW Engineer ~$233K •Chief Security Officer •~$225k •CISO •~$192K •Securit y Consult. •~$199K Job Security High Starting Salaries Scholarships Diversity Impact Average starting salary with B.S. Degree $115K
  • 9. Natural qualities of women 1. Calmness 2. Fairness 3. Intuition 4. Compassion 5. Intelligence 6. Flexibility 7. Confidence 8. Courage 9. Decisiveness 10. Detailed
  • 10. Opportunities abound! 10 “…where will your cybersecurity journey take you?”
  • 12. Scholarships and Incentives for Women  The SANS CyberTalent Women’s Immersion Academy  The Women’s Society of Cyberjutsu (WSC)  Women in Cybersecurity  The National Initiative for Cybersecurity Careers and Studies  For a comprehensive list visit the NICCS Women and Minorities Webpage.
  • 13. Resources Women Working Dare to Live Fully: www.womenworking.com Center for Cyber Safety and Education: www.iamcybersafe.org SANS Cyber Talent Immersion Academy for Women: https://www.sans.org/cybertalent/immersion-academy#womens-academy eBook: Everything You Need to Know About a Career in Cyber Security: https://onlinedegrees.sandiego.edu/ebook-everything-need-know-career-cyber- security/ eBook: The Diversity Advantage: Fixing Gender Inequality in the Workplace on Amazon FREE NYU High School STEM Summer Program for Female Students: http://engineering.nyu.edu/k12stem/cs4cs/ The Women Society of Cyberjutsu: http://womenscyberjutsu.org/ Women in Cyber Security (WiCyS): https://www.csc.tntech.edu/wicys/
  • 14. Moderator Adrienne (A.D.) Williams, PMP Systems Engineer Manager Northrop Grumman Adrienne.Williams@ngc.com Panelist Dayatra Rivette Information Security Officer and Privacy Lead Lockheed Martin Corp Dayatra.l.rivette@lmco.com Panelist Colonel Maria Biank US Army Cyber Command, G3 Maria.a.biank.mil@mail.mil Panelist Felicia Jackson Senior Computer System Security Technologist Raytheon Mission Systems Felicia.jackson@raytheon.com Your Questions? 14
  • 15. “Our deepest fear is not that we are inadequate. Our deepest fear is that we are powerful beyond measure. …We ask ourselves, Who am I to be brilliant, gorgeous, talented, fabulous? Actually, who are you not to be? … …as we let our own light shine, we unconsciously give other people permission to do the same. As we are liberated from our own fear, our presence automatically liberates others.” Marianne Williamson 15
  • 16. 16
  • 17. Moderator Panel Questions <<DO NOT KEEP IN THE DECK>> 1. The cyber threat landscape continues to evolve and becomes more complex as time passes, how do you find work/life balance in a career like this? 2. What are the skillsets that are vital to a career in cybersecurity; both technical and soft skills? 3. What keeps you up at night? How have you effected change? 4. What does a cybersecurity career path look like? Then what?

Editor's Notes

  1. https://www.forbes.com/sites/stevemorgan/2016/03/28/calling-all-women-the-cybersecurity-field-needs-you/#4274007d381c
  2. #2 - Technical Acumen Subject matter expertise in networks, platforms, applications, or infrastructure Knowledge of tactics, techniques, and procedures (TTPs) used by adversaries Business Acumen Higher order thinking; understanding of business objectives and strategies Risk vs opportunities Softskills Critical thinking Articulate; ability to convey complex topics in simplistic and business-aligned terms