We are Women In Cyber, and We Secure The World. Our movement goals are:
Encouraging young women to start a career in cyber security, Encouraging women in cyber security to expand their potential and grow in their career, Creating role models for cyber security professionals who are men and women, and Building curiosity and passion within the millennials to think about a career in the field !
Read our Story.
IDENTITY - A Multi-faceted problem is Not just the relevant for KYC / AML / CTF but increasingly necessary in an age of sophisticated Cybercrime and Millions of displaced migrants, and BIG Data needs AI to help process the massive quantities of DATA being generated.
This was the topic of the first ID/AI conference in Singapore, organized by Ian Myles. Ian Myles is the founder of area 51. With a background in Design / Mobile & Payments, Ian is bringing user-centred experiences to Payments, Wear-ables & Biometrics.
Singapore economy is benefiting from an amazing environment of solid economic growth, and this Fintech Festival is a real proof. Being an Asian hub, and one of the World’s greatest innovative countries, Singapore attracted with the Fintech Festival more than 25,000 participants from over 100 countries.
Everyone heard about the Equifax hack… I even met someone who had been a victim of this attack. He did not know what to do exactly and how to protect himself after this breach.
Following this immense impact of American Citizens, US legislators are seriously considering a change, looking at safer options as an alternative to Social Security numbers after the Equifax hack.
On Nov, 8th 2017, the Senate Commerce Committee had an in-depth discussion with Yahoo ex-CEO Marissa Mayer, Verizon security officer Karen Zacharia, the present and previous CEOs of Equifax. They exchanged about providing and building a more resilient way to protect consumers from data breaches.
Cyber Security is everywhere. We hear and read about it on TV, magazine, newspapers, etc. All information is related to the urgency of good protection against cyber threats and attacks.
Learning about cyber security can be fun and definitely original as well. These videos are only examples of a much wider pool of other amazing ones, that you can find online.
Enjoy Watching !
The Impact of the cyber security boom is undeniably important and brings on many additional questions from the InfoSec community.
‘’The white hat hackers guide to hacking & pentesting for the common good’’ will be broadly educating on hacking techniques across cloud, mobile and web applications, as each of these topics requires books on their own to dig into the topics in depth. The book on Amazon costs $0.99. The proceeds of this book will be donated by Peerlyst to http://withoutmyconsent.org, an organization fighting online harassment.
Implementing cloud MUST be aligned with security measures to tackle the associated cyber risks.
Security is an advantage, and a competitive value. I believe that the responsibilities of the security professional handling cloud transformation include architecture review and hardening the configuration of the cloud architecture and subsequent security requirements.
A Free CISSP Webinar with Video and Tutorial
A key aspect of security is access control – Whether or not to accept a request.
Access control = Mechanism by which services know whether to accept or deny requests.
Some things inspire us and have a “wow” effect on us. Some things inspire us and make us wonder more but some things inspire us and make us take an action. I remember giving my first presentation about Cell phone viruses and security in 2008 for my intercollege paper presentation competition, and this was the first time I got interested in cyber security. After winning that competition, I started participating in more state and national level competitions, going to different colleges to listen to different speakers and reading the latest news about what is going on in this field.
Cecilia McGuire has led an exceptional career in IT Security over the past 15 years and gained significant expertise through a diverse range of International experiences. Her areas of interests are where Cyber-Security intersects with the Physical Domain, such as Critical Infrastructure.
Her speciality is Security Architecture across the full-scope of Cyber-Security Technologies and delivery of high-risk, complex projects.
I completed my Polytechnic Diploma in Computer Science & Engineering in 2002 and then started my career as a part time trainer while pursuing my Bachelor’s degree in the same discipline. Post my graduation I started as an Asst. Professor but soon joined corporate world where I was fortunate to work with Barclays Capital, Credit Suisse, JP Morgan & Chase, Royal Bank of Scotland, Hewitt to name few.
Youssef Elmalty is an internationally renowned cybersecurity expert specializing in cyber crime and defense.
Based out of Singapore, Youssef is currently the head of cybersecurity for IBM and provides thought leadership across multiple IBM Security Consulting & Delivery domains. This includes Security Strategy, Risk, Compliance, Security Assessments and Incident Response.
Over the different stages of my life, there have been many times when a book helped me focus in the right directions and get my motivation and strength back. There were also days where the only activity that could release my stress was reading. And, it is amazingly great that in Singapore, we have this library as well, where you can just grab a book or eight 😊 ! It was always super empowering and inspiring, especially for someone who is building his own business.
I prepared a list of books that I consider as must-read female empowerment books in technology.
Step out in style with these beautiful beach ready flip flops. Designed for comfort, they'll...
These socks will give you maximum comfort and style simultaneously! The top of the sock...
This sturdy white, glossy ceramic mug is an essential to your cupboard. This brawny version...
With its square bottom, this tote is perfect for carrying just about anything, from groceries...
This hybrid case combines a solid polycarbonate back, with flexible, rigid sides. It fits your...
This super-soft, baby-knit t-shirt looks great on both men and women – it fits like...
The ring-spun cotton and polyester blend give this v-neck tee an easy-breezy feel, perfect for...
This is a soft and comfortable tank, plus the racerback cut gives it an athletic...
Magda Lilia Chelly, is the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night. Magda spend most of her time raising security awareness at a global scale, and supporting chief information security officers in their cyber security strategy and roadmap. She is currently based in Singapore, with a global reach through her company in 19 locations worldwide. She speaks five languages fluently, and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security.
She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally.
Her educational passion led to the foundation of a cyber security diploma in Singapore with Trent Global College, and a global partnership with K2 Partnering Solutions, for cyber educational programs, and organizational design.
Observation Deck at RSAC
Day 1 of the RSA Conference 2017, San Francisco; I paced from vendor booth to vendor booth mentally notating specific technical marketing differentiators of each cybersecurity solution suggested (both venerated and new.) Yet as this theoretical repository was quickly filling, there was one thing subconsciously I couldn’t help but observe. Where were all the women? ....
Scott: The cybersecurity industry is in dire need of information security professionals to combat growing global cyber threats. There is a clear shortage, especially in the lack of women entering the cyber workforce. I am a proud father of two. My young son may follow in my footsteps as the third generation running my family technology business. Should my 12 year old daughter choose a similar path in the tech industry, she will likely face ‘technology prejudice’ like so many women before her. My daughter is a hard worker in advanced placement and honors classes and far smarter than I was at her age. Yet, she will face many more obstacles than my son and I have ever faced despite her accomplishments.
Responsible Cyber Pte. Ltd. | Industry Specific Cyber-Security Advisory, Training, Awareness & Recruitment | Co. Reg No: 201616321C
Main Office: 25A Smith Street, Singapore 058939
Phone: (+65) 6225 9115
Email: info (at) responsible-cyber.com