SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez nos Conditions d’utilisation et notre Politique de confidentialité.
SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez notre Politique de confidentialité et nos Conditions d’utilisation pour en savoir plus.
Who is TeleSign: TeleSign Corporation is a Communications Platform as a Service company, founded on security, based in Los Angeles, California. Founded in 2005, by Darren Berkovitz, Ryan Disraeliand Stacy Stubblefield, is one of the Leaders in Digital Identity and Programmable Communications. TeleSign connects and protects online experiences with sophisticated digital identity and programmable communications solutions. Through APIs that deliver user verification, data insights, and communications we solve today’s unique customer challenges by bridging business to the complex world of global telecommunications.
Hardware jobs often require adjacent degrees of knowledge, such as mechanical engineering, material engineering etc.
Data science is an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from many structural and unstructured data. Data science is related to data mining, machine learning and big data.
Data Scientists are often mathematicians and physicists. Data Engineer is a worker whose primary job responsibilities involve preparing data for analytical or operational uses.
A product manager is the person who identifies the customer need and the larger business objectives that a product or feature will fulfill, articulates what success looks like for a product, and rallies a team to turn that vision into a reality.
The program manager is therefore responsible for the delivery of the output/product of the program, which will involve managing a portfolio of projects and programs. They coordinate the teams who are working on the various projects. However, they don’t manage the individual projects. That’s the purview of the project manager.
Account takeover (ATO) means gaining access and control over a user account, with the goal of committing fraud. Hackers steal credentials, meaning sets of login usernames and passwords, in order to take ownership of a user account. Attackers often replicate their success by taking advantage of the high rate of password reuse across a user’s accounts. ATO attempts can be done manually by individuals or groups, or at scale using bots. Hackers will purchase lists of stolen credentials using black market sites or by extracting login data themselves. https://www.signalsciences.com/glossary/account-takeover-ato/
2FA adds additional layer of protection. Two-factor authentication (2FA) significantly decreases the risk of hackers accessing online accounts, blocking 96% of bulk phishing attacks. Prevent end-user account compromise and unauthorized access with two-factor authentication & customer identity data. ATO is fueled by the increase in daily massive data breaches, social engineering, phishing, and brute force attacks. Hackers gain access to personally identifiable information that leaves consumer accounts vulnerable to takeover. Online businesses that require users to enter login or registration credentials have a responsibility to protect accounts. Verify end-user identity and block spam at account registration using phone verification and intelligence-based fraud risk scoring. When new users are not verified at account registration, companies risk allowing bad actors into their user base. The damage caused includes user abandonment, negative brand impact, and decreased user base value. (Data from TeleSign's Fraud Report) Utilize phone intelligence to simplify the onboarding process for legitimate users while identifying and blocking risky users before they can do harm. These companies put their business and their legitimate users at risk by not verifying that each new user is who they say they are. On average, organizations surveyed spent $4M to respond to spam or fraud committed by unverified users. (Data from TeleSign's Fraud Report)
Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security
Jobs, Women in CS/IT
Wei Sophie Lin, Ph.D.
Vice President, Engineering
Jobs in CS/IT1
Women in CS/IT2
My Personal Journey3
Prepare For Your Journey4
• IT Backoffice
• Data Science
• Product Management
• Program Management
• Information Management
Circuit boards, routers, memory devices, IoT
The sky is the limit
Design, implement, and maintain database
Jobs in Industry
UI design and development
Jobs in Industry
How Did I Get Where I Am Now?
Know what you want
Ask yourself what is your passion?1
Discover what is out there
Attend conferences, trade shows, job fairs2
Go to meetups, networking events3
Talk to someone who has been in the field,
your school’s advisors, your family
Plan, plan, and plan
Set your goal(s)
Determine your timeframe
Construct your plan
Build your technical foundation and your soft skills
Study, Practice, Be Curious, Be Creative
Be a sponge
Learn as much as you can
Get an internship
See the real world
Have an inquisitive mind
Think outside the box
Try doing things differently
Identity-based security is an approach to control access to a
digital product or service based on the authenticated identity of an
Let’s dive into one topic: Account Take Over (ATO)
What is Account
What: gain access and control over a user
Why: commit fraud
How: manual or automated using stolen