Skip to main content

2018 | Buch

Women in Security

Changing the Face of Technology and Innovation

insite
SUCHEN

Über dieses Buch

This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field’s evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing – this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.

Inhaltsverzeichnis

Frontmatter

Introduction

Frontmatter
Chapter 1. Introduction - Book Summary
Abstract
We have come a long way Baby! What we have here is a showcase of women in the cyber security field, who have helped shape the face of security. Most are seasoned professionals with 20–30 years of experience. We have actively participated in growing this field from scratch. It has evolved from obscurity to present-day boardroom visibility. Sometimes, we have to take time to look back, to see just how far we’ve come.
Debra Christofferson

Cyber Risk, Technology & Innovation

Frontmatter
Chapter 2. Under a New Security Landscape: Global Ramifications of Multijurisdictional Conflicts
A Guide for CEOs and Board of Directors on Multijurisdictional Legal Issues
Abstract
The new security landscape requires a deeper level of scrutiny, greater compliance, increased accountability, and more collaboration among our governments and the private sector. Encryption failures, the emergence of sophisticated hackers, and vast data collection by data brokers in our post-Snowden world exposed the complex correlation between security and privacy.
Adriana Sanford
Chapter 3. Managing Cybersecurity Risk for the Coming Decade
Abstract
We will hear from many successful women in this book who have taken their valuable time to share their experience with us. Women and men alike, have substantial achievements in the field, and unlimited opportunity. You will meet a few of them in this book and perhaps in person in the future.
Debra Christofferson
Chapter 4. The Era of Homo Digitus
Abstract
We have emerged as a new species. We have become digital beings whose lives are closely anchored to digital objects: Deep learning, artificial intelligence, and behavioral analytics are no longer buzz words; they are part of our new reality. From a security and privacy perspective, there are new and different considerations. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about in “The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and more recently highlighted as a Gigaom conference theme.
Evelyn de Souza
Chapter 5. This Girl Wants to Go To School Here!
Abstract
You need to know a lot of things to be a security leader. Growing up, and even into my 20s, I never wanted or suspected this would be my career. Looking back, I’m truly surprised at what I’ve done, how lucky I’ve been, and the lessons I’ve learned along the way.
Ilene Klein
Chapter 6. Three Decades of Digital Security
Abstract
I’ve spent 30 long years as an exterminator- battling computer bugs, worms, and digital infestations of all types. Sure it’s had its moments, but I’ve primarily played a comic game of whack-a-mole, fevered prayers, and after-action hedging.
Jeani Park
Chapter 7. Hidden Dangers of Internet of Things
Abstract
Computer security has evolved over the past 25 years as innovative technologies embrace wireless telecommunication integrating information and data and connecting the world globally. I can remember in the early 1990s the announcement that the “Super Highway” was coming with the prediction that it was going to significantly change the way we do business, the way we live, and the way we work.
Martha Daniel
Chapter 8. Information Security: Beyond the Bits and Bytes
Abstract
Information security is many things, but boring is definitely not one of them. It’s a rollercoaster where the ride gets more dramatic every year, zipping down a plunging chute and taking your breath away. I’ve worked in information security for most of my professional career. I got into it when I became bored with building accounting software, and there was an opening in a group at my company that was building a product to “automagically” handle data of different security classifications (e.g., people who can only access “Unclassified” information wouldn’t be able to view or change information labeled “Secret”). As a former U.S. Navy officer, I knew something about the value of limiting data access based on security classifications. I took a job as a product manager in that team and almost immediately found what “tripped my trigger” in the tech sector: security! Since that first security job, I’ve worked with a bunch of different teams and technologies and enjoyed (almost) every minute of it.
Mary Ann Davidson
Chapter 9. Building the Bridges to Security
Abstract
Over the years, I have solely resided in IT (Information Technology) organizations, until now, where I work in a more evolutionary function. My achievements have directly supported the businesses that depend on IT to run. Core competencies include engineering and administration of the network backbone, plus UNIX servers supporting the IT Infrastructure. These directly connect the IT environment to the business groups and functions.
Miriam Fernandez
Chapter 10. It’s All About the Cocoa Beans
Abstract
Starting as a cyber defense strategy, I served in the U.S. Navy as a Cryptologist. Spending 11 years at a global level, I worked special missions for National Security Agency (NSA) and the Navy. This created the foundation that got me to where I am today, in the cyber security field. Following Military service, I completed a stint at the White House doing Special Operations.
Pamela Fusco
Chapter 11. Organizational Intelligence: Cybersecurity as a Performance Optimizer
Abstract
Recent cybersecurity innovations in both technology and standards, set a new tone for organizations, allowing for cyber-intelligence to be capitalized on by focusing on continuous collection, analysis, policy enforcement, and remediation at multiple enterprise levels. Vast improvements in governance, risk, and compliance management follow.
Rhonda Farrell

Foundation for Newcomers

Frontmatter
Chapter 12. The Pursuit of Cybersecurity Career
Abstract
I am profoundly grateful for the opportunity to use this platform to share personal experiences—all of which have in their own ways culminated in a career in cybersecurity. If I’m being honest, I will add that the journey to this point has at times been riddled with various challenges and upheavals which have required me to hone in steadfastly on my relentless drive to finish what I start.
Juanita Agard
Chapter 13. Making it in the National Security Field as a Millennial Minority
Abstract
As a young Chinese-American woman, I stand out in the stuffy meeting rooms of the DC national security industry. In meetings I am often the only woman of color and millennial—I am often asked if I am an Intern or whether this is my first job. I’ve been working in national security since 2003 so while this question is flattering and amusing, it demonstrates how few other millennial minority women decide to enter and remain in the national security field.
Lacey Chong

Alternative Careers

Frontmatter
Chapter 14. Improving Women’s Participation in the Security Field
Abstract
This chapter shares the experiences of the author while exploring why there is a lack of women in security. The theme of the chapter is getting women involved in the field through education and publication opportunities. It includes outreach programs and resources that are available to help those interested in pursuing interests in this ever expanding area of technology.
Diane Barrett
Metadaten
Titel
Women in Security
herausgegeben von
Dr. Debra A. Christofferson
Copyright-Jahr
2018
Electronic ISBN
978-3-319-57795-1
Print ISBN
978-3-319-57794-4
DOI
https://doi.org/10.1007/978-3-319-57795-1

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.