Get Girls Into Science Technology and Math (STEM) and Save The World

Get Girls Into Science Technology and Math (STEM) and Save The World

Study after study shows the myriad ways girls are systematically discouraged from pursuing science, technology, engineering, and math (STEM) subjects. Teachers, parents, and peers, often unconsciously or subtly (sometimes not so subtly) persuade girls that STEM pursuits are unsuited to them and that they’ll fail if they try. So they don’t. So what can we do to fix it?

Jumpstarting Your Journey in Cybersecurity: A Comprehensive Guide for Aspiring Professionals

Jumpstarting Your Journey in Cybersecurity: A Comprehensive Guide for Aspiring Professionals

Cybersecurity is a rapidly growing field, with a high demand for professionals who can protect against online threats and ensure the privacy and security of sensitive information. If you're interested in starting a career in cybersecurity, here are some steps to help you get started.

Breaking it Down: Black Hat vs. DEFCON - Which Cybersecurity Conference is Right for You?

Breaking it Down: Black Hat vs. DEFCON - Which Cybersecurity Conference is Right for You?

The world of cybersecurity is vast and ever-changing. As technology continues to advance, the need for skilled professionals who can keep up with new developments and protect against evolving threats is crucial. One way to stay current and informed is to attend cybersecurity conferences, where you can learn about the latest trends, tools, and best practices. Two of the most popular conferences in the cybersecurity world are Black Hat and DEFCON. In this blog post, we'll explore the key differences between these two events and help you determine which one is right for you.

An Overview of the 16 Critical Infrastructure Sectors: Keeping Our Nation Secure

An Overview of the 16 Critical Infrastructure Sectors: Keeping Our Nation Secure

Critical infrastructure refers to those vital systems, networks, and assets whose incapacitation or destruction would have a debilitating effect on national security, the economy, public health, or any combination thereof. In the U.S., the Department of Homeland Security (DHS) has demarcated 16 specific critical infrastructure sectors. These sectors serve as the pillars that support the nation's day-to-day operations and its citizens' way of life.

Unveiling My Black Hat 2023 Presentations

Unveiling My Black Hat 2023 Presentations

I am delighted to announce the titles of my upcoming presentations for Black Hat 2023, both scheduled for August 10th. Here's a glimpse into what you can expect.

Join Me at Austin's Startup Week: A Deep Dive into Insider Threats and Neural Networking

Join Me at Austin's Startup Week: A Deep Dive into Insider Threats and Neural Networking

Austin Startup Week, since its inception in 2011, has always been a vibrant tapestry of Austin's entrepreneurial spirit. A unique confluence of entrepreneurs, local leaders, and enthusiasts, it offers a rich platform to connect, collaborate, and grow. This year marks the 13th iteration of this celebrated event, which will span from November 6-10, 2023. From enlightening sessions, hands-on workshops, to dynamic startup showcases and networking mixers, Austin Startup Week promises to be an engaging experience. To all those who celebrate the spirit of innovation and entrepreneurship, I wholeheartedly encourage you to register and be a part of this distinctive celebration of Austin's diverse community of trailblazers.

Battle of the Minds: My Experience at the Texas Cyber Summit

Battle of the Minds: My Experience at the Texas Cyber Summit

I attended the Texas Cyber Summit for the first time this year, held at the Marriott in downtown Austin from September 28th to September 30th. Overall, I thoroughly enjoyed the event and am already planning to return next year.

ManageEngine ADAudit Plus Vulnerability

ManageEngine ADAudit Plus Vulnerability

While exploring the security aspects of ManageEngine ADAudit Plus, I discovered a security vulnerability (CVE-2023-32783) that may have far-reaching implications for other product users. These findings indicate that ADAudit Plus contains a vulnerability which allows Windows user accounts to remain completely undetected by ADAudit Plus.

Decoding CISO Success: 8 Key Performance Indicators to Evaluate Your Cybersecurity Leader

Decoding CISO Success: 8 Key Performance Indicators to Evaluate Your Cybersecurity Leader

In today's digital age, the role of a Chief Information Security Officer (CISO) has dramatically evolved. Beyond technical expertise, a CISO's responsibilities now encompass leadership, strategic planning, and effective communication with both technical and non-technical stakeholders. Measuring the success of a CISO can be challenging given the multifaceted and ever-evolving nature of cybersecurity.

RSA 2023: Securing the Nation's Critical Infrastructures

RSA 2023: Securing the Nation's Critical Infrastructures

As a fellow at ICIT and co-author of the book “Securing the Nation’s Critical Infrastructures: A Guide for the 2021-2025 Administration,” I was honored to be asked to speak at the RSA Conference 2023 in San Francisco on the topic of “Digital Supply Chain Security: What Happens When an Organization's Trusted Solutions Can No Longer Be Trusted?” Many thanks to SafeBreach, who sponsored the event and for hosting the reception and book signing afterward.