|
|
|
AppSec California 2016 - Panel Women in Security - Lisa Napier - Wei Lin - Emily Stark |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
AppSec California 2016 - Panel Women in Security - Lisa Napier - Wei Lin - Emily Stark Par SecurityTube.NetLe [2016-03-30] à 14:33:12
Présentation : Diversity in teams produces better results What are the challenges barriers that might not be visible to the general population What are the factors that make women successful in Security Technology What can organizations, teams do to encourage and retain talent What are the biggest industry challenges today We ll have a lively discussion on challenges, and what actions can help today and tomorrow. Lisa Napier NetApp Sr. Product Security Program Manager Lisa Napier, Sr. Product Security Program Manager at NetApp currently leads the Product Security program for NetApp. She previously led various Product Security initiatives including Secure Development Lifecycle at Cisco Systems, as well as organizing the internal Secure Development conference called SecCon for many years. She was the first Security CCIE at Cisco, and one of the founding members of the Cisco PSIRT. Wei Lin Symantec Senior Director Wei Lin, Senior Director, heads the E-Commerce Engineering organization at Symantec. Lin has led various engineering groups within Symantec, including the Security Technology Group and the Norton brand consumer product groups, played a key role in the success of both Consumer and Enterprise security products. Lin has been co-chair of various leadership committees for the Grace Hopper Conference planning. She was the General Co-Chair of Grace Hopper 2014 Conference. Before entering into the computer and network security field, Lin led software development in computer 3D graphics and reconstruction applied to aerospace and biomedical research. She holds a Bachelor of Science degree from Fudan University, and a Ph.D. in Medical Imaging from University of Paris. Emily Stark Google Software Engineer Emily is a software engineer on the Google Chrome security team, where she focuses on efforts to make TLS SSL more usable and secure. Previously, she was a core developer at Meteor Development Group, where she worked on web framework security and internal infrastructure, and a graduate student researching client-side cryptography in web browsers. Emily has a master's degree from MIT and a bachelor's degree from Stanford, both in computer science. Caroline Wong Cigital, Inc. Director of Strategic Security Initiatives Caroline Wong, CISSP, is the Director of Strategic Security Initiatives at Cigital, the world's largest consulting firm specializing in software security. Prior to this role, Caroline led a product management team at Symantec and security teams at Zynga and eBay. Caroline is the author of Security Metrics A Beginner s Guide and is well known as a thought leader on the topics of security strategy, operations, and metrics. She has been a featured speaker at industry conferences including RSA USA and Europe , ITWeb Summit South Africa , Metricon, the Executive Women's Forum, ISC2 and the Information Security Forum. Caroline contributed as a technical reviewer to the Center for Information Security Consensus Metrics Definitions. She graduated from U.C. Berkeley with a B.S. in Electrical Engineering and Computer Sciences, has a Certificate in Finance and Accounting from Stanford's Executive Education Program, and is CISSP certified. Caroline was awarded the 2010 Women of Influence One to Watch Award by the Executive Women's Forum. For More Information Please Visit - https 2016.appseccalifornia.org
Les mots clés de la revue de presse pour cet article : california security Les videos sur SecuObs pour les mots clés : security Les mots clés pour les articles publiés sur SecuObs : security Les éléments de la revue Twitter pour les mots clé : security
Les derniers articles du site "SecurityTube.Net" :
- TROOPERSCON - Crypto code the 9 circles of testing - TROOPERSCON - Towards a LangSec Aware SDLC - TROOPERSCON - Deep dive into SAP archive file formats - TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable - TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account - TROOPERSCON - One Tool To Rule Them All - TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics - TROOPERSCON - The Chimaera Processor - TROOPERSCON - Lets Play Hide and Seek in the Cloud - TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|