SlideShare a Scribd company logo
1 of 21
Jobs, Women in CS/IT
Identity Security
Wei Sophie Lin, Ph.D.
Vice President, Engineering
TeleSign
Agenda
Jobs in CS/IT1
Women in CS/IT2
My Personal Journey3
Prepare For Your Journey4
Identity-based Security5
Jobs in CS/IT
Edit Subtitle
Insert Headline
Academia
• Research
• Teaching
• IT Backoffice
Industry
• Hardware
• Software
• Data Science
• Product Management
• Program Management
• Information Management
• UX/UI
Hardware
Circuit boards, routers, memory devices, IoT
devices
Software
The sky is the limit
Data Science
Data Scientist
Data Engineering
Database
Administrator
Design, implement, and maintain database
system
Jobs in Industry
Hardcore
Product Manager
Business focused
Program Manager
Project management
UI Engineer
UI design and development
Customer Support
Support customers
Jobs in Industry
Other
Women in CS/IT
Gender Diversity
Increases Creativities
and Innovation
*McKinsey, Forbes
*Published by NCWIT on April 21st, 2020
You Are the Future
Change the world
Make an impact
My Personal Journey
How Did I Get Where I Am Now?
B.S. Medical
Engineering (Fu
Dan Univ)
Ph.D. Medical
Imaging (Paris-
Sud Univ)
Post-Doctoral
Fellow (McGill
Univ)
Software
Engineer/Mana
ger (Leco)
Sr. Software
Engineer/Group
Leader (CAE)
Manager/Sr.
Director
(Symantec)
Lecturer (CPP)
Vice President
(TeleSign)
Prepare For Your
Journey
PLAN
Know what you want
Ask yourself what is your passion?1
Discover what is out there
Attend conferences, trade shows, job fairs2
Network
Go to meetups, networking events3
Seek advice
Talk to someone who has been in the field,
your school’s advisors, your family
4
Plan, plan, and plan
Set your goal(s)
Determine your timeframe
Construct your plan
5
Build your technical foundation and your soft skills
Study, Practice, Be Curious, Be Creative
Be a sponge
Learn as much as you can
Get an internship
See the real world
Ask “why”?
Have an inquisitive mind
Think outside the box
Try doing things differently
Identity-based security is an approach to control access to a
digital product or service based on the authenticated identity of an
individual.
Let’s dive into one topic: Account Take Over (ATO)
IDENTITY-BASED
SECURITY
What is Account
Takeover?
What: gain access and control over a user
account
Why: commit fraud
How: manual or automated using stolen
credentials
ATO Infography
https://nudatasecurity.com/account-takeover-infographic/
THREAT LANDSCAPE
SOLUTIONS
Add Two-Factor
Authentication
Prevent Account Takeover
Streamline Account
Registration
Reduce Fake Accounts
CONTACT US
13274 Fiji Way #600,
Marina Del Rey, CA 90292
(800) 850-3485 contact@telesign.com www.telesign.com

More Related Content

Similar to Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security

Information Systems from Designers’ Perspective
Information Systems from Designers’ PerspectiveInformation Systems from Designers’ Perspective
Information Systems from Designers’ PerspectiveMuhammad Ikhwan Jambak
 
Informatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri SlickInformatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri SlickTeri Slick
 
It presentation final1
It presentation final1It presentation final1
It presentation final1wakhale
 
BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxgarnerangelika
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyaySabyasachi Mukhopadhyay
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...Microsoft
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center EngineerThe Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center EngineerIDCA
 
20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_english20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_englishit-innovation
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing
 
The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...Software Park Thailand
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitOpenSystems Media
 
Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15Barney Edwards
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptxslidecell212100
 
Northstar Technological Advancement and Research center
Northstar Technological Advancement and Research centerNorthstar Technological Advancement and Research center
Northstar Technological Advancement and Research centerJaiSinghGupta1
 

Similar to Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security (20)

Information Systems from Designers’ Perspective
Information Systems from Designers’ PerspectiveInformation Systems from Designers’ Perspective
Information Systems from Designers’ Perspective
 
Informatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri SlickInformatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri Slick
 
It presentation final1
It presentation final1It presentation final1
It presentation final1
 
IT Careers
IT CareersIT Careers
IT Careers
 
BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docx
 
Chinar Profile 2012
Chinar Profile 2012Chinar Profile 2012
Chinar Profile 2012
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center EngineerThe Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
 
20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_english20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_english
 
wfs_resume
wfs_resumewfs_resume
wfs_resume
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media Kit
 
The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media Kit
 
Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Northstar Technological Advancement and Research center
Northstar Technological Advancement and Research centerNorthstar Technological Advancement and Research center
Northstar Technological Advancement and Research center
 

More from Alan Quayle

Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Alan Quayle
 
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Alan Quayle
 
What makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelWhat makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelAlan Quayle
 
eSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasaleSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasalAlan Quayle
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeAlan Quayle
 
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...Alan Quayle
 
Programmable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigProgrammable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigAlan Quayle
 
How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...Alan Quayle
 
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisLatest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisAlan Quayle
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...Alan Quayle
 
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Alan Quayle
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleAlan Quayle
 
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuOpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuAlan Quayle
 
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoTADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoAlan Quayle
 
What happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleWhat happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleAlan Quayle
 
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichStacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichAlan Quayle
 
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...Alan Quayle
 
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateFounding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateAlan Quayle
 
How to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciHow to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciAlan Quayle
 

More from Alan Quayle (20)

What is a vCon?
What is a vCon?What is a vCon?
What is a vCon?
 
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
 
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
 
What makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelWhat makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias Goebel
 
eSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasaleSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João Casal
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin Sime
 
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
 
Programmable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigProgrammable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas Granig
 
How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...
 
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisLatest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
 
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan Quayle
 
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuOpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
 
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoTADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
 
What happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleWhat happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan Quayle
 
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichStacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
 
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
 
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateFounding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
 
How to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciHow to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro Gauci
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security

Editor's Notes

  1. Who is TeleSign: TeleSign Corporation is a Communications Platform as a Service company, founded on security, based in Los Angeles, California.[1] Founded in 2005, by Darren Berkovitz, Ryan Disraeli[2]and Stacy Stubblefield, is one of the Leaders in Digital Identity and Programmable Communications. TeleSign connects and protects online experiences with sophisticated digital identity and programmable communications solutions. Through APIs that deliver user verification, data insights, and communications we solve today’s unique customer challenges by bridging business to the complex world of global telecommunications.
  2. Hardware jobs often require adjacent degrees of knowledge, such as mechanical engineering, material engineering etc. Data science is an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from many structural and unstructured data.[1][2] Data science is related to data mining, machine learning and big data. Data Scientists are often mathematicians and physicists. Data Engineer is a worker whose primary job responsibilities involve preparing data for analytical or operational uses.
  3. A product manager is the person who identifies the customer need and the larger business objectives that a product or feature will fulfill, articulates what success looks like for a product, and rallies a team to turn that vision into a reality. The program manager is therefore responsible for the delivery of the output/product of the program, which will involve managing a portfolio of projects and programs. They coordinate the teams who are working on the various projects. However, they don’t manage the individual projects. That’s the purview of the project manager.
  4. Account takeover (ATO) means gaining access and control over a user account, with the goal of committing fraud. Hackers steal credentials, meaning sets of login usernames and passwords, in order to take ownership of a user account. Attackers often replicate their success by taking advantage of the high rate of password reuse across a user’s accounts. ATO attempts can be done manually by individuals or groups, or at scale using bots. Hackers will purchase lists of stolen credentials using black market sites or by extracting login data themselves. https://www.signalsciences.com/glossary/account-takeover-ato/
  5. 2FA adds additional layer of protection. Two-factor authentication (2FA) significantly decreases the risk of hackers accessing online accounts, blocking 96% of bulk phishing attacks. Prevent end-user account compromise and unauthorized access with two-factor authentication & customer identity data. ATO is fueled by the increase in daily massive data breaches, social engineering, phishing, and brute force attacks. Hackers gain access to personally identifiable information that leaves consumer accounts vulnerable to takeover. Online businesses that require users to enter login or registration credentials have a responsibility to protect accounts. Verify end-user identity and block spam at account registration using phone verification and intelligence-based fraud risk scoring. When new users are not verified at account registration, companies risk allowing bad actors into their user base. The damage caused includes user abandonment, negative brand impact, and decreased user base value. (Data from TeleSign's Fraud Report) Utilize phone intelligence to simplify the onboarding process for legitimate users while identifying and blocking risky users before they can do harm. These companies put their business and their legitimate users at risk by not verifying that each new user is who they say they are. On average, organizations surveyed spent $4M to respond to spam or fraud committed by unverified users. (Data from TeleSign's Fraud Report)