We are Women In Cyber, and We Secure The World. Our movement goals are:
Encouraging young women to start a career in cyber security, Encouraging women in cyber security to expand their potential and grow in their career, Creating role models for cyber security professionals who are men and women, and Building curiosity and passion within the millennials to think about a career in the field !
Read our Story.
GET YOUR VPN NOW TO SURF PRIVATELY
According to UN [...] research, women are increasingly becoming victims of cyber-attacks. This is due to an important usage of the Internet. Women build relationships and maintain them over the cyber space. Unfortunately, this only means an increase of the risks of a cyber-attack, identity theft or even fraud. It turns out that especially young women, aged between 18-24, experience this type of activities. 26% of them were victims of online stalking and 25% of online sexual harassment. These threats will continue to increase with the increase of connectivity.
This platform is built to empower women in cyber security. However, let’s advise other women, as well.
I have been reading and looking around for some good stuff about cyber legislation and laws, and I found this amazing book for $10,514.82.
We spent more than 10 hours on research, and editing, to review the top 10 best RFID Blocking Wallets. Being in security, and raising awareness about the topic is definitely giving you also tips on good products that you could purchase to protect yourself and your beloved ones. Credit cards, passports, or driver’s licences have all an embedded radio frequency identification device. This means that cybercriminals or just criminal are able to steal your personal information from the chips. Therefore, a good way to make sure that your data and information is kept private and secured is to use those RFID Blocking wallets.
We are giving you here a list of wallets that we found the most suitable and the most likeable.
Chief Information Security Officer Guide has an objective of giving you some practical advice about the current situation of a CISO role and corporate perception and expectations.
The CISO role has been previously characterized as a technical/IT related role. This has drastically evolved and nowadays, the CISO/CSO role has much wider responsibilities. This guide is structured as a high level, through main considerations and feedback from my own personal experience.
The Impact of the cyber security boom is undeniably important and brings on many additional questions from the InfoSec community.
‘’The white hat hackers guide to hacking & pentesting for the common good’’ will be broadly educating on hacking techniques across cloud, mobile and web applications, as each of these topics requires books on their own to dig into the topics in depth. The book on Amazon costs $0.99. The proceeds of this book will be donated by Peerlyst to http://withoutmyconsent.org, an organization fighting online harassment.
Implementing cloud MUST be aligned with security measures to tackle the associated cyber risks.
Security is an advantage, and a competitive value. I believe that the responsibilities of the security professional handling cloud transformation include architecture review and hardening the configuration of the cloud architecture and subsequent security requirements.
Franziska Bühler currently works as a Senior Systems Engineer in Switzerland.
Her main areas of responsibility are web server security and everything related to the access layer. In Switzerland, this typically includes authentication and web application firewalls.
She holds a Bachelor of Science degree in computer science with a specialization in IT security. She is also a Certified OSSTMM Professional Security Tester (OPST), accredited by ISECOM (Institute for Security and Open Methodologies).
Some things inspire us and have a “wow” effect on us. Some things inspire us and make us wonder more but some things inspire us and make us take an action. I remember giving my first presentation about Cell phone viruses and security in 2008 for my intercollege paper presentation competition, and this was the first time I got interested in cyber security. After winning that competition, I started participating in more state and national level competitions, going to different colleges to listen to different speakers and reading the latest news about what is going on in this field.
I completed my Polytechnic Diploma in Computer Science & Engineering in 2002 and then started my career as a part time trainer while pursuing my Bachelor’s degree in the same discipline. Post my graduation I started as an Asst. Professor but soon joined corporate world where I was fortunate to work with Barclays Capital, Credit Suisse, JP Morgan & Chase, Royal Bank of Scotland, Hewitt to name few.
Youssef Elmalty is an internationally renowned cybersecurity expert specializing in cyber crime and defense.
Based out of Singapore, Youssef is currently the head of cybersecurity for IBM and provides thought leadership across multiple IBM Security Consulting & Delivery domains. This includes Security Strategy, Risk, Compliance, Security Assessments and Incident Response.
Over the different stages of my life, there have been many times when a book helped me focus in the right directions and get my motivation and strength back. There were also days where the only activity that could release my stress was reading. And, it is amazingly great that in Singapore, we have this library as well, where you can just grab a book or eight 😊 ! It was always super empowering and inspiring, especially for someone who is building his own business.
I prepared a list of books that I consider as must-read female empowerment books in technology.
Magda Lilia Chelly, is the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night. Magda spend most of her time raising security awareness at a global scale, and supporting chief information security officers in their cyber security strategy and roadmap. She is currently based in Singapore, with a global reach through her company in 19 locations worldwide. She speaks five languages fluently, and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security.
She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally.
Her educational passion led to the foundation of a cyber security diploma in Singapore with Trent Global College, and a global partnership with K2 Partnering Solutions, for cyber educational programs, and organizational design.
Observation Deck at RSAC
Day 1 of the RSA Conference 2017, San Francisco; I paced from vendor booth to vendor booth mentally notating specific technical marketing differentiators of each cybersecurity solution suggested (both venerated and new.) Yet as this theoretical repository was quickly filling, there was one thing subconsciously I couldn’t help but observe. Where were all the women? ....
Scott: The cybersecurity industry is in dire need of information security professionals to combat growing global cyber threats. There is a clear shortage, especially in the lack of women entering the cyber workforce. I am a proud father of two. My young son may follow in my footsteps as the third generation running my family technology business. Should my 12 year old daughter choose a similar path in the tech industry, she will likely face ‘technology prejudice’ like so many women before her. My daughter is a hard worker in advanced placement and honors classes and far smarter than I was at her age. Yet, she will face many more obstacles than my son and I have ever faced despite her accomplishments.
Responsible Cyber Pte. Ltd. | Industry Specific Cyber-Security Advisory, Training, Awareness & Recruitment | Co. Reg No: 201616321C
Main Office: 25A Smith Street, Singapore 058939
Phone: (+65) 6225 9115
Email: info (at) responsible-cyber.com