Remove 2000 Remove Information Security Remove InfoSec
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Booth babes and rampant sexism were more of a problem in infosec in the past. I went to Black Hat in 2000. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? That is, until Chenxi Wang spoke up.

InfoSec 40
article thumbnail

Y2k + 20: risk, COVID and "the Internet issue"

Notice Bored

For a long time prior to the year 2000, a significant number of software programmers had taken the same shortcut we all did back in "the 90s". So, egged-on by information security pro's and IT auditors (me, for instance), management took the risk seriously and invested significant resources into solving "the Y2k issue".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weaving strategies with policies

Notice Bored

And are you looking to exploit information security knowledge and expertise in all corners of the world, or are you still chasing the evaporating pool of local talent? As well as infosec policies, what are your business policies for managing the information risk security function?

Risk 66
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. The general goal with Cyberstakes is to first and foremost to introduce and educate people with basic infosec skills.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. The general goal with Cyberstakes is to first and foremost to introduce and educate people with basic infosec skills.

article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted.

article thumbnail

On Detection: Tactical to Functional

Security Boulevard

The master and his emissary: The divided brain and the making of the western world. Yale University Press. [2]: 2]: Atkinson, Jared C. 2022, September 8). Part 6: What is a Procedure? 3]: Wedin, Michael V. Aristotle’s theory of substance. Oxford University Press. [4]: 4]: Aristotle. Categories (H.P Cooke, Hugh Tredennick, Trans.).