Webinar Series

Autism and Cybersecurity 


Autism and Cybersecurity


People with Autism Spectrum Disorder (ASD) often do very well in cybersecurity. Solving security problems requires people who think about the goals or purpose of components without the builder’s assumptions and can concentrate on problems or puzzles for extended periods. Both of these skills can be found in many diverse groups, including people with ASD. ⁠

There is currently more room for creativity and consideration when evaluating people on the spectrum, and it is important to challenge the status quo for hiring criteria consistently. ⁠

This webinar aims to increase awareness and provide guidance, or resources, for anyone interested in learning more about not only autism but also the link between autism and cybersecurity. ⁠

We start by outlining the issues before moving into a discussion on resources from the cybersecurity community as a whole, resources for individuals and companies, and finally detailing unique and innovative ways for skills identification and training.

Register for the next Webinar

Our Speakers

Tom Richards


Co-Founder and Chief Strategy Officer, GroupSense

As the chief strategy officer and co-founder of GroupSense, Tom has played a vital role in shaping the company’s vision and executing on its growth strategies. Tom led the creation of TraceLight, the GroupSense analysis engine, which serves as the backbone of the company’s cyber-reconnaissance operations. The idea for TraceLight came several years ago when a discovery was made for a large credit card company. Its customers’ card numbers were being bought and sold in the open on the dark web.

Tapping his 15 years of experience in cybersecurity with industry giants like NTT, Verizon Wireless and Integralis, Tom developed the first-generation cyber-reconnaissance engine that would become TraceLight, which saved his client tens of millions of dollars each year in fraud costs. Since then, TraceLight has helped GroupSense deliver similar value to Fortune 1000 companies and government organizations across risk areas including data breach detection, ransomware attack mitigation, insider malfeasance, mis/disinformation campaigns, supply chain security and more.


Register for the next Webinar

Watch Other Webinar Recordings! 

Webinar One 

⁠Responding to COVID-19 Changing the Cybersecurity Landscape 

Since the start of the COVID-19 pandemic we have seen a massive increase in cyber-attacks. In this webinar we discuss some of the measures people have taken to help those attacked while disabling some of the attacks. This is being done by companies and also by individual volunteers who have come together to create a taskforce to protect the people and institutions fighting these invisible attackers. 


Webinar Two

⁠Cyber Attacks Taking Advantage of COVID-19: Detailed Views 

In this webinar, we dive deeper into the discussion of new and evolving cybersecurity challenges brought on by the COVID-19 pandemic.  


Webinar Three

What We Can Learn to Better Prepare for the Next One

⁠In this week's webinar, we discuss innovative methods we can use to gather a complete data set on these attacks, analysis techniques that might be useful in examining this data set and potential recommendations that will arise as a result of the analysis process, and what data is available now and why it's not enough.  We also touch on how you can get involved to help now and what we can do to prepare for the future.