Webinar Series

Women in Security Roundtable  






 

Women in Security Roundtable 

______________________

Cybersecurity offers one of the most interesting, complex, and varied career opportunities. With work ranging from low-level technical research, spending time in computer labs with like-minded scientists, to management positions that oversee real-time network operations centers with 1000s of employees, no matter your goals and work preferences, cybersecurity may offer an exciting option. ⁠

Today, women are represented in every type of cybersecurity position, and during this webinar, we will hear from a variety of perspectives on what working in cybersecurity is like. 





Register for the next Webinar




Our Speakers

Dr. Rebecca Mercuri

Jean Pawluk

Dana Woolcock

Founding President, Notable Software Inc.⁠ ⁠

Dr. Rebecca Mercuri is the founding President and lead digital forensic investigator of Notable Software, Inc. She holds numerous degrees in Computer Science and Engineering, including a Ph.D. from the School of Engineering and Applied Science at the University of Pennsylvania. Her doctoral dissertation, other writings in peer-reviewed publications (including for the ACM and IEEE) regarding the inherent insecurity and fallibility of black box software in electronic voting equipment, and decades of personal advocacy, have been acclaimed for spearheading the trend toward global adoption of voter verified paper ballots in public elections. Dr. Mercuri has also addressed the U.S. FEC, EAC, NIST, and other agencies, regarding the many risks and problems posed by unreviewed black box software in voting systems. Earlier, in her Computer Science career, she performed line-by-line reviews of source code deployed in aircraft collision avoidance systems. Now, as an expert witness, she has testified in State and Federal U.S. Courts regarding the need to perform reviews of forensic tools used remotely by law enforcement to collect data on unsuspecting citizens.

Executive Consultant

Jean Pawluk is an Executive Consultant, ISSA Distinguished Fellow and honored as a 2015 SC Magazine “Woman of Influence”. With a global focus on strategy, architecture, and technology in the high tech and financial industries, she alternates between technical and executive leadership roles. Once focused on security and cryptography for the financial industry, her current focus is on the use and abuse of blockchains, augmented reality & the Internet of Things (IOT). 

Director of Cross Engineering, Barracuda Networks

Dana Woolcock currently holds a position of Director of Cross Engineering in the Office of CTO at Barracuda Networks. Dana joined Barracuda Networks in 2015 after spending 5 years working in the IT Helpdesk at University of Michigan - Flint. Dana started as a QA Engineer focusing on Barracuda’s shared codebase. While she excelled in her technical work, she also showed exceptional organization and project leadership skills. In the recent years, Dana stepped into engineering management and is now leading a full-stack engineering organization in delivering internal tools and critical customer facing cloud services. Dana's career growth at Barracuda is easily identified as one of the most outstanding examples of driving exceptional outcome with people leadership and strong communications. Her passion in empowering every team member to their strength has produced a dynamic, efficient and nimble development engine.

Diana Neuman

Keaira Philogene


Executive Director, Bace Cybersecurity

Institute ⁠Diana joined Bace Cybersecurity Institute to help honor and continue the legacy of security leadership and visionary work that Becky Bace directly inspired. Diana has been in cybersecurity for over 20 years, focusing on cutting edge research in both consulting areas (like penetration testing and security architecture design) as well as product research, resulting in multiple patents and commercial software packages. Those research efforts have been focused on both specialized problems including work for the government, as well as universal issues, like eliminating passwords and making security easier to use, that impact everyone. As executive director of BCI, Diana is the chief volunteer helping bring together our amazing members, experts, and volunteers to make the Internet safer for everyone. 

Staff Auditor, Marcum LLP

Keaira is a staff auditor for Marcum LLP in the Cyber and Risk Advisory practice. As a cyber and risk auditor, Keaira has the opportunity to work with Companies and organization across many different industries. She also has experience working as a Security Operations Analyst, were she served as a liaison between the firm and client to respond to emerging incidents in a timely manner. Keaira is a member of the Women in Cybersecurity organization, ISACA, and also enjoys helping out in the community. In May 2019, Keaira graduated from the University of Tampa with a Bachelor's degree in Cybersecurity. She is currently a second graduate student at the University of San Diego, where she is working on her degree in Cybersecurity Operations and Leadership. She is on track to finish her Masters in the summer of 2021. 



 


Register for the next Webinar



Watch Other Webinar Recordings! 

Webinar One 

⁠Responding to COVID-19 Changing the Cybersecurity Landscape 

Since the start of the COVID-19 pandemic we have seen a massive increase in cyber-attacks. In this webinar we discuss some of the measures people have taken to help those attacked while disabling some of the attacks. This is being done by companies and also by individual volunteers who have come together to create a taskforce to protect the people and institutions fighting these invisible attackers. 

 

Webinar Two

⁠Cyber Attacks Taking Advantage of COVID-19: Detailed Views 

In this webinar, we dive deeper into the discussion of new and evolving cybersecurity challenges brought on by the COVID-19 pandemic.  


 

Webinar Three

What We Can Learn to Better Prepare for the Next One

⁠In this week's webinar, we discuss innovative methods we can use to gather a complete data set on these attacks, analysis techniques that might be useful in examining this data set and potential recommendations that will arise as a result of the analysis process, and what data is available now and why it's not enough.  We also touch on how you can get involved to help now and what we can do to prepare for the future.