3. What Steps?
Get experience
– Align yourself with the department or group that
is handling security
– Volunteering in a non-profit organization
Take control of your self-learning (just
keep on learning!)
– Degrees
– Certifications
– On-line courses
Participate at Conferences
4. What Steps? (cont.)
Join a Group
– Women’s Society of Cyberjutsu
– Groups from Meetup.com (local groups)
– Information Systems Security Association
(ISSA)
Women in Security SIG
Participate Capture the Flag (CTF)
competitions – you don’t have to be
an expert
5. Further Steps
Volunteer
Networking via Linkedin or Twitter
Read security news sites and
blogs
Run a background check of
yourself
– A sensitive field
– Employers are looking for ethical candidates
6. Best Information Security Certifications for
2016
CompTIA Security+
CEH: Certified Ethical Hacker
GSEC: SANS GIAC Security Essentials
CISSP: Certified Information Systems
Security Professional
CISM: Certified Information Security
Manager
Source: Tom’s IT PRO – Best Information Security Certifications for 2016, September 3, 2015
7. Best Information Security Certifications for 2016 – Job Board Search
Results
Source: Tom’s IT PRO – Best Information Security Certifications for 2016, September 3, 2015
8. Led a
research
project on
Advanced
Persistent
Threat (APT)
Took Information
Systems
Security
Certificate
courses and
attended
security
conferences
Took a Ethical
Hacking /
Penetration
Testing course and
attended local
cybersecurity meet
up groups
Participated in a cyber
competition as a blue
team, presented at
conferences and a
local meet up group,
and enrolled at SAN
graduate program in
Ethical
Hacking/Penetration
testing
Took a job offer at
Raytheon and work
in the Information
Assurance
organization
My Journey
Continue
attending local
cybersecurity
meet up
groups /
conferences
and pursuing
the CISSP cert
exam. Also
serving as a
volunteer at the
Women’s
Cyberjutsu new
LA chapter
Feb 2012 ~ Nov 2012
Jan 2013
Jan 2015
Sept 2014
Aug 2015
2015 - Present
It made a huge impact! So
I decided to change my
career field to cybersecurity
9.
10.
11. Biography
Mary Y Wang
Information Systems Security Officer
Raytheon Space and Airborne Systems, California
Mary Wang joined Raytheon in August, 2015. Currently, she works in the Raytheon Space
and Airborne Systems Information Assurance organization. She has a strong passion in
cybersecurity especially in the penetration testing and application security areas. Prior to
joining Raytheon, she was a Senior Software Engineer and Project Lead at The Boeing
Company. She worked on a variety of software projects at Boeing. Mary holds a Bachelor
of Science degree in Computer Science and Masters degree in Master Business
Administration. She is currently attending SANS Technology Institute for a graduate degree
in Pen Testing & Ethical Hacking. Mary also has been a frequent speaker at Annual
Women Engineers Conferences.
Notes de l'éditeur
<number>
<number>
<number>
Certified Ethical Hacker CEH is a registered trademark of the EC-Council
Certified Information Systems Security Professional CISSP is a registered trademark of (ISC)²
<number>