SlideShare une entreprise Scribd logo
1  sur  11
Copyright © 2016 Raytheon Company. All rights reserved.
Go for the Hot Career Field – Cybersecurity!
Annual Women Engineers Conference 2016
Mary Y Wang
October 28, 2016
T h i s d o c u m e n t d o e s n o t c o n t a i n t e c h n o l o g y o r T e c h n i c a l D a t a c o n t r o l l e d u n d e r e i t h e r t h e U . s . I n t e r n a t i o n a l T r a f f i c i n A r m s R e g u l a t i o n s o r t h e U . S . E x p o r t A d m i n i s t r a t i o n R e g u l a t i o n s
Women in Information Security
10% in
information security.
Our Time is Now
What Steps?
 Get experience
– Align yourself with the department or group that
is handling security
– Volunteering in a non-profit organization
 Take control of your self-learning (just
keep on learning!)
– Degrees
– Certifications
– On-line courses
 Participate at Conferences
What Steps? (cont.)
 Join a Group
– Women’s Society of Cyberjutsu
– Groups from Meetup.com (local groups)
– Information Systems Security Association
(ISSA)
 Women in Security SIG
 Participate Capture the Flag (CTF)
competitions – you don’t have to be
an expert
Further Steps
 Volunteer
 Networking via Linkedin or Twitter
 Read security news sites and
blogs
 Run a background check of
yourself
– A sensitive field
– Employers are looking for ethical candidates
Best Information Security Certifications for
2016
 CompTIA Security+
 CEH: Certified Ethical Hacker
 GSEC: SANS GIAC Security Essentials
 CISSP: Certified Information Systems
Security Professional
 CISM: Certified Information Security
Manager
Source: Tom’s IT PRO – Best Information Security Certifications for 2016, September 3, 2015
Best Information Security Certifications for 2016 – Job Board Search
Results
Source: Tom’s IT PRO – Best Information Security Certifications for 2016, September 3, 2015
Led a
research
project on
Advanced
Persistent
Threat (APT)
Took Information
Systems
Security
Certificate
courses and
attended
security
conferences
Took a Ethical
Hacking /
Penetration
Testing course and
attended local
cybersecurity meet
up groups
Participated in a cyber
competition as a blue
team, presented at
conferences and a
local meet up group,
and enrolled at SAN
graduate program in
Ethical
Hacking/Penetration
testing
Took a job offer at
Raytheon and work
in the Information
Assurance
organization
My Journey
Continue
attending local
cybersecurity
meet up
groups /
conferences
and pursuing
the CISSP cert
exam. Also
serving as a
volunteer at the
Women’s
Cyberjutsu new
LA chapter
Feb 2012 ~ Nov 2012
Jan 2013
Jan 2015
Sept 2014
Aug 2015
2015 - Present
It made a huge impact! So
I decided to change my
career field to cybersecurity
Biography
Mary Y Wang
Information Systems Security Officer
Raytheon Space and Airborne Systems, California
Mary Wang joined Raytheon in August, 2015. Currently, she works in the Raytheon Space
and Airborne Systems Information Assurance organization. She has a strong passion in
cybersecurity especially in the penetration testing and application security areas. Prior to
joining Raytheon, she was a Senior Software Engineer and Project Lead at The Boeing
Company. She worked on a variety of software projects at Boeing. Mary holds a Bachelor
of Science degree in Computer Science and Masters degree in Master Business
Administration. She is currently attending SANS Technology Institute for a graduate degree
in Pen Testing & Ethical Hacking. Mary also has been a frequent speaker at Annual
Women Engineers Conferences.

Contenu connexe

En vedette

WE16 - International Space Station - Configuration Analysis & Integration
WE16 - International Space Station - Configuration Analysis & IntegrationWE16 - International Space Station - Configuration Analysis & Integration
WE16 - International Space Station - Configuration Analysis & IntegrationSociety of Women Engineers
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureSociety of Women Engineers
 
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...Society of Women Engineers
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionSociety of Women Engineers
 
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...Society of Women Engineers
 
Give Back: Teach Engineering to Underserved Minority Kids
Give Back: Teach Engineering to Underserved Minority KidsGive Back: Teach Engineering to Underserved Minority Kids
Give Back: Teach Engineering to Underserved Minority KidsSociety of Women Engineers
 
Science Museum Learnings and Action: Engaging Girls in STEM
Science Museum Learnings and Action: Engaging Girls in STEMScience Museum Learnings and Action: Engaging Girls in STEM
Science Museum Learnings and Action: Engaging Girls in STEMSociety of Women Engineers
 
Speak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in TechSpeak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in Techaubrey bach
 
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...CODECNetworks
 
Using Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsUsing Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsPayScale, Inc.
 
Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Christopher Clark
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
Blueprint to Jumpstart a Successful Engineering Career
Blueprint to Jumpstart a Successful Engineering CareerBlueprint to Jumpstart a Successful Engineering Career
Blueprint to Jumpstart a Successful Engineering CareerSociety of Women Engineers
 
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonNavigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonChristopher Clark
 
Cyber Security Career Advice
Cyber Security Career AdviceCyber Security Career Advice
Cyber Security Career AdviceDonald E. Hester
 

En vedette (20)

WE16 - International Space Station - Configuration Analysis & Integration
WE16 - International Space Station - Configuration Analysis & IntegrationWE16 - International Space Station - Configuration Analysis & Integration
WE16 - International Space Station - Configuration Analysis & Integration
 
WE16 - Shine Theory
WE16 - Shine TheoryWE16 - Shine Theory
WE16 - Shine Theory
 
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the FutureWE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
WE16 - Leaving a Legacy - Donating to SWE & Inspiring the Future
 
WE16 - How to Lead a Double Life
WE16 - How to Lead a Double LifeWE16 - How to Lead a Double Life
WE16 - How to Lead a Double Life
 
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
WE16 - Unfortunately Money Doesn't Grow on Trees: How to Fund Your Graduate S...
 
WE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and InclusionWE16 - Courageous Conversation on Diversity and Inclusion
WE16 - Courageous Conversation on Diversity and Inclusion
 
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
WE16 - Practical Integration of Diversity and Inclusion Competencies into Eng...
 
How to Effectively Ask For a Mentor
How to Effectively Ask For a MentorHow to Effectively Ask For a Mentor
How to Effectively Ask For a Mentor
 
Give Back: Teach Engineering to Underserved Minority Kids
Give Back: Teach Engineering to Underserved Minority KidsGive Back: Teach Engineering to Underserved Minority Kids
Give Back: Teach Engineering to Underserved Minority Kids
 
Science Museum Learnings and Action: Engaging Girls in STEM
Science Museum Learnings and Action: Engaging Girls in STEMScience Museum Learnings and Action: Engaging Girls in STEM
Science Museum Learnings and Action: Engaging Girls in STEM
 
Speak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in TechSpeak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in Tech
 
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
 
Using Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsUsing Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary Negotiations
 
Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
Blueprint to Jumpstart a Successful Engineering Career
Blueprint to Jumpstart a Successful Engineering CareerBlueprint to Jumpstart a Successful Engineering Career
Blueprint to Jumpstart a Successful Engineering Career
 
New Girl on the Job
New Girl on the JobNew Girl on the Job
New Girl on the Job
 
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonNavigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
 
Cyber Security Career Advice
Cyber Security Career AdviceCyber Security Career Advice
Cyber Security Career Advice
 
BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
 

Similaire à WE16 - Go for the Hot Career Field - Cybersecurity

Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
How to write a conference proposal
How to write a conference proposalHow to write a conference proposal
How to write a conference proposalSarah Cecchetti
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Dana Gardner
 
ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference Robert Stroud
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingThinAir
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemSecurityStudio
 
The Business of Security Leadership
The Business of Security LeadershipThe Business of Security Leadership
The Business of Security LeadershipKeyaan Williams
 
Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Angie Chang
 
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdfThe Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdfInsightsSuccess4
 
Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...
Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...
Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...Salesforce Engineering
 
Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...
Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...
Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...Dana Gardner
 
Irresponsible Disclosure: Short Handbook of an Ethical Developer
Irresponsible Disclosure: Short Handbook of an Ethical DeveloperIrresponsible Disclosure: Short Handbook of an Ethical Developer
Irresponsible Disclosure: Short Handbook of an Ethical DeveloperLemi Orhan Ergin
 

Similaire à WE16 - Go for the Hot Career Field - Cybersecurity (20)

Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
How to write a conference proposal
How to write a conference proposalHow to write a conference proposal
How to write a conference proposal
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
 
ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
The Business of Security Leadership
The Business of Security LeadershipThe Business of Security Leadership
The Business of Security Leadership
 
Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)
 
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdfThe Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
The Most Influential Women Breaking Barriers In Cybersecurity For 2024.pdf
 
Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...
Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...
Carrots not sticks- Using Gamification to Transform Security Mindset of an Or...
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...
Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...
Resiliency, Risk Management Add a New Dimension to Discussions about Enterpri...
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Irresponsible Disclosure: Short Handbook of an Ethical Developer
Irresponsible Disclosure: Short Handbook of an Ethical DeveloperIrresponsible Disclosure: Short Handbook of an Ethical Developer
Irresponsible Disclosure: Short Handbook of an Ethical Developer
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
How big is your shadow?
How big is your shadow?How big is your shadow?
How big is your shadow?
 
The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018
 

Plus de Society of Women Engineers

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Society of Women Engineers
 
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations Society of Women Engineers
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderSociety of Women Engineers
 

Plus de Society of Women Engineers (20)

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2
 
Opening keynote
Opening keynoteOpening keynote
Opening keynote
 
Moonshot rodriguez slides
Moonshot rodriguez slidesMoonshot rodriguez slides
Moonshot rodriguez slides
 
Moonshot fetch slides
Moonshot fetch slidesMoonshot fetch slides
Moonshot fetch slides
 
H ivs ai_wehr_slides
H ivs ai_wehr_slidesH ivs ai_wehr_slides
H ivs ai_wehr_slides
 
H ivs ai_faust_slides
H ivs ai_faust_slidesH ivs ai_faust_slides
H ivs ai_faust_slides
 
H ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slidesH ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slides
 
Closing keynote
Closing keynoteClosing keynote
Closing keynote
 
Ball d 8
Ball d 8Ball d 8
Ball d 8
 
Ball d 7
Ball d 7Ball d 7
Ball d 7
 
Ball d 6
Ball d 6Ball d 6
Ball d 6
 
Ball d 4
Ball d 4Ball d 4
Ball d 4
 
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations
 
How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team
 
Using SWE to Complement your Career
Using SWE to Complement your Career Using SWE to Complement your Career
Using SWE to Complement your Career
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE Leader
 
18 cd 32
18 cd 3218 cd 32
18 cd 32
 
How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!
 
The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)
 
Beyond Disruption
Beyond Disruption Beyond Disruption
Beyond Disruption
 

Dernier

Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Dernier (20)

Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

WE16 - Go for the Hot Career Field - Cybersecurity

  • 1. Copyright © 2016 Raytheon Company. All rights reserved. Go for the Hot Career Field – Cybersecurity! Annual Women Engineers Conference 2016 Mary Y Wang October 28, 2016 T h i s d o c u m e n t d o e s n o t c o n t a i n t e c h n o l o g y o r T e c h n i c a l D a t a c o n t r o l l e d u n d e r e i t h e r t h e U . s . I n t e r n a t i o n a l T r a f f i c i n A r m s R e g u l a t i o n s o r t h e U . S . E x p o r t A d m i n i s t r a t i o n R e g u l a t i o n s
  • 2. Women in Information Security 10% in information security. Our Time is Now
  • 3. What Steps?  Get experience – Align yourself with the department or group that is handling security – Volunteering in a non-profit organization  Take control of your self-learning (just keep on learning!) – Degrees – Certifications – On-line courses  Participate at Conferences
  • 4. What Steps? (cont.)  Join a Group – Women’s Society of Cyberjutsu – Groups from Meetup.com (local groups) – Information Systems Security Association (ISSA)  Women in Security SIG  Participate Capture the Flag (CTF) competitions – you don’t have to be an expert
  • 5. Further Steps  Volunteer  Networking via Linkedin or Twitter  Read security news sites and blogs  Run a background check of yourself – A sensitive field – Employers are looking for ethical candidates
  • 6. Best Information Security Certifications for 2016  CompTIA Security+  CEH: Certified Ethical Hacker  GSEC: SANS GIAC Security Essentials  CISSP: Certified Information Systems Security Professional  CISM: Certified Information Security Manager Source: Tom’s IT PRO – Best Information Security Certifications for 2016, September 3, 2015
  • 7. Best Information Security Certifications for 2016 – Job Board Search Results Source: Tom’s IT PRO – Best Information Security Certifications for 2016, September 3, 2015
  • 8. Led a research project on Advanced Persistent Threat (APT) Took Information Systems Security Certificate courses and attended security conferences Took a Ethical Hacking / Penetration Testing course and attended local cybersecurity meet up groups Participated in a cyber competition as a blue team, presented at conferences and a local meet up group, and enrolled at SAN graduate program in Ethical Hacking/Penetration testing Took a job offer at Raytheon and work in the Information Assurance organization My Journey Continue attending local cybersecurity meet up groups / conferences and pursuing the CISSP cert exam. Also serving as a volunteer at the Women’s Cyberjutsu new LA chapter Feb 2012 ~ Nov 2012 Jan 2013 Jan 2015 Sept 2014 Aug 2015 2015 - Present It made a huge impact! So I decided to change my career field to cybersecurity
  • 9.
  • 10.
  • 11. Biography Mary Y Wang Information Systems Security Officer Raytheon Space and Airborne Systems, California Mary Wang joined Raytheon in August, 2015. Currently, she works in the Raytheon Space and Airborne Systems Information Assurance organization. She has a strong passion in cybersecurity especially in the penetration testing and application security areas. Prior to joining Raytheon, she was a Senior Software Engineer and Project Lead at The Boeing Company. She worked on a variety of software projects at Boeing. Mary holds a Bachelor of Science degree in Computer Science and Masters degree in Master Business Administration. She is currently attending SANS Technology Institute for a graduate degree in Pen Testing & Ethical Hacking. Mary also has been a frequent speaker at Annual Women Engineers Conferences.

Notes de l'éditeur

  1. <number>
  2. <number>
  3. <number>
  4. Certified Ethical Hacker CEH is a registered trademark of the EC-Council Certified Information Systems Security Professional CISSP is a registered trademark of (ISC)² <number>
  5. <number>
  6. <number>
  7. <number>
  8. <number>
  9. <number>