Co-sponsored by Cigital and IEEE Security & Privacy.
Date | Title & Description | Contributors |
---|---|---|
2017-08-30 |
Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management Wafaa Mamilli is Vice President, Chief Information Security Officer (CISO) at Eli Lilly and Company where she leads a global, enterprise-wide information and product security organization. She started her career consulting in Paris prior to joining Lil... |
|
2017-07-31 |
Show 136: Pavi Ramamurthy discusses the relationship between development and software security Pavi Ramamurthy manages the security ecosystem at LinkedIn as a Senior Information Security Manager. The Security Ecosystem team holds much of the responsibility for software security at the firm, including: software security training, awareness, bug h... |
|
2017-06-29 |
Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS Ksenia Dmitrieva-Peguero is a Principal Consultant within Synopsys’ Software Integrity Group. She is a subject matter expert in a variety of software security practices including static analysis tool design and execution, customization, and deployment.... |
|
2017-05-24 |
Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism Kelly Jackson Higgins is the Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with over 20 years of experience as a reporter and editor. Publications that Kelly has been associated with include Net... |
|
2017-04-27 |
Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security Cheryl Biswas is a Cyber Security Consultant focusing on threat intelligence at KPMG Canada. Her IT career began over 20 years ago at CP Rail’s helpdesk, with further roles in vendor management and change management. She went on to work as an InfoSec r... |
|
2017-03-29 |
Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech Dr. Chenxi Wang is the founder of the Jane Bond Project. She has built an illustrious security career with experience at Forrester Research, Intel Security, CipherCloud, and Twistlock. Dr. Wang started her career as a computer security faculty member a... |
|
2017-02-28 |
Show 131: Kate Pearce Discusses the Relationship Between Biology and Security Kate Pearce is a Senior Security Consultant at Cisco within the Customer Solutions division. In her career, Kate approaches security from diverse perspectives encompassing defenders, builders, assessors, and attackers. Her approach blends business, aca... |
|
2017-01-23 |
Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible Jessy Irwin is Vice President of Security and Privacy at Mercury Public Affairs. Her work focuses on human-centric technology and security. Jessy works tirelessly to make security and privacy accessible to the average person through education and aware... |
|
2016-12-27 |
Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security Kelly Lum, a.k.a. Aloria, is a Security Engineer at Tumblr and an Adjunct Professor of Graduate Computer Networking and Application Security at NYU. She has 13 years of experience in computer security, having previously worked in both the government an... |
|
2016-11-29 |
Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics Lesley Carhart is the Security Incident Response Lead at a large corporation in the Chicagoland area where she and her team work with digital theft, misconfiguration, and hacking issues. She has 17 years of experience in the IT industry, eight of which... |
|