Remove Applications Remove Information Security Remove Nonprofit Remove Virtualization
article thumbnail

The ‘Great Retraining’: IT upskills for the future

CIO Business Intelligence

When the timing was right, Chavarin honed her skills to do training and coaching work and eventually got her first taste of technology as a member of Synchrony’s intelligent virtual assistant (IVA) team, writing human responses to the text-based questions posed to chatbots.

Training 136
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. To this day, the US Department of Defense uses chenxification to protect mobile applications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Tennisha: Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So what am I missing here.

Study 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security. Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So what am I missing here.

Study 40
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

Then again, you might want someone --anyone -- to come in as a Level 1 security analyst so your current Level 1s can advance. But how do you even start to identify who might be good in a role in information security? Hrm post those dope descriptions and get applications. It’s simple things like that.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52