SlideShare a Scribd company logo
1 of 21
Jobs, Women in CS/IT
Identity Security
Wei Sophie Lin, Ph.D.
Vice President, Engineering
TeleSign
Agenda
Jobs in CS/IT1
Women in CS/IT2
My Personal Journey3
Prepare For Your Journey4
Identity-based Security5
Jobs in CS/IT
Edit Subtitle
Insert Headline
Academia
• Research
• Teaching
• IT Backoffice
Industry
• Hardware
• Software
• Data Science
• Product Management
• Program Management
• Information Management
• UX/UI
Hardware
Circuit boards, routers, memory devices, IoT
devices
Software
The sky is the limit
Data Science
Data Scientist
Data Engineering
Database
Administrator
Design, implement, and maintain database
system
Jobs in Industry
Hardcore
Product Manager
Business focused
Program Manager
Project management
UI Engineer
UI design and development
Customer Support
Support customers
Jobs in Industry
Other
Women in CS/IT
Gender Diversity
Increases Creativities
and Innovation
*McKinsey, Forbes
*Published by NCWIT on April 21st, 2020
You Are the Future
Change the world
Make an impact
My Personal Journey
How Did I Get Where I Am Now?
B.S. Medical
Engineering (Fu
Dan Univ)
Ph.D. Medical
Imaging (Paris-
Sud Univ)
Post-Doctoral
Fellow (McGill
Univ)
Software
Engineer/Mana
ger (Leco)
Sr. Software
Engineer/Group
Leader (CAE)
Manager/Sr.
Director
(Symantec)
Lecturer (CPP)
Vice President
(TeleSign)
Prepare For Your
Journey
PLAN
Know what you want
Ask yourself what is your passion?1
Discover what is out there
Attend conferences, trade shows, job fairs2
Network
Go to meetups, networking events3
Seek advice
Talk to someone who has been in the field,
your school’s advisors, your family
4
Plan, plan, and plan
Set your goal(s)
Determine your timeframe
Construct your plan
5
Build your technical foundation and your soft skills
Study, Practice, Be Curious, Be Creative
Be a sponge
Learn as much as you can
Get an internship
See the real world
Ask “why”?
Have an inquisitive mind
Think outside the box
Try doing things differently
Identity-based security is an approach to control access to a
digital product or service based on the authenticated identity of an
individual.
Let’s dive into one topic: Account Take Over (ATO)
IDENTITY-BASED
SECURITY
What is Account
Takeover?
What: gain access and control over a user
account
Why: commit fraud
How: manual or automated using stolen
credentials
ATO Infography
https://nudatasecurity.com/account-takeover-infographic/
THREAT LANDSCAPE
SOLUTIONS
Add Two-Factor
Authentication
Prevent Account Takeover
Streamline Account
Registration
Reduce Fake Accounts
CONTACT US
13274 Fiji Way #600,
Marina Del Rey, CA 90292
(800) 850-3485 contact@telesign.com www.telesign.com

More Related Content

Similar to Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security

Information Systems from Designers’ Perspective
Information Systems from Designers’ PerspectiveInformation Systems from Designers’ Perspective
Information Systems from Designers’ PerspectiveMuhammad Ikhwan Jambak
 
Informatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri SlickInformatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri SlickTeri Slick
 
It presentation final1
It presentation final1It presentation final1
It presentation final1wakhale
 
BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxgarnerangelika
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyaySabyasachi Mukhopadhyay
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...Microsoft
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center EngineerThe Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center EngineerIDCA
 
20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_english20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_englishit-innovation
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing
 
The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...Software Park Thailand
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitOpenSystems Media
 
Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15Barney Edwards
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Nick Davis
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptxslidecell212100
 
Northstar Technological Advancement and Research center
Northstar Technological Advancement and Research centerNorthstar Technological Advancement and Research center
Northstar Technological Advancement and Research centerJaiSinghGupta1
 

Similar to Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security (20)

Information Systems from Designers’ Perspective
Information Systems from Designers’ PerspectiveInformation Systems from Designers’ Perspective
Information Systems from Designers’ Perspective
 
Informatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri SlickInformatics (Recruiting) Teri Slick
Informatics (Recruiting) Teri Slick
 
It presentation final1
It presentation final1It presentation final1
It presentation final1
 
IT Careers
IT CareersIT Careers
IT Careers
 
BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docx
 
Chinar Profile 2012
Chinar Profile 2012Chinar Profile 2012
Chinar Profile 2012
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center EngineerThe Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
The Pinnacle of Tech Expertise: Unveiling the Role of a Data Center Engineer
 
20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_english20191030 bitas hayashi mamoru_english
20191030 bitas hayashi mamoru_english
 
wfs_resume
wfs_resumewfs_resume
wfs_resume
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media Kit
 
The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...The Need to Professionalize the Discipline of EA The Need to Professionalize ...
The Need to Professionalize the Discipline of EA The Need to Professionalize ...
 
Embedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media KitEmbedded Computing Design 2015 Media Kit
Embedded Computing Design 2015 Media Kit
 
Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15Barney Edwards Resume 10.29.15
Barney Edwards Resume 10.29.15
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5Ibm Collaboration Conference Sept 2007 V5
Ibm Collaboration Conference Sept 2007 V5
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Northstar Technological Advancement and Research center
Northstar Technological Advancement and Research centerNorthstar Technological Advancement and Research center
Northstar Technological Advancement and Research center
 

More from Alan Quayle

Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Alan Quayle
 
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Alan Quayle
 
What makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelWhat makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelAlan Quayle
 
eSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasaleSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasalAlan Quayle
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeAlan Quayle
 
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...Alan Quayle
 
Programmable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigProgrammable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigAlan Quayle
 
How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...Alan Quayle
 
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisLatest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisAlan Quayle
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...Alan Quayle
 
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Alan Quayle
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleAlan Quayle
 
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuOpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuAlan Quayle
 
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoTADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoAlan Quayle
 
What happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleWhat happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleAlan Quayle
 
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichStacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichAlan Quayle
 
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...Alan Quayle
 
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateFounding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateAlan Quayle
 
How to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciHow to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciAlan Quayle
 

More from Alan Quayle (20)

What is a vCon?
What is a vCon?What is a vCon?
What is a vCon?
 
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
Supercharging CPaaS Growth & Margins with Identity and Authentication, Aditya...
 
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
Building a sub-second virtual ThunderDome: Considerations for mass scale sub-...
 
What makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias GoebelWhat makes a cellular IoT API great? Tobias Goebel
What makes a cellular IoT API great? Tobias Goebel
 
eSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João CasaleSIM as Root of Trust for IoT security, João Casal
eSIM as Root of Trust for IoT security, João Casal
 
Architecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin SimeArchitecting your WebRTC application for scalability, Arin Sime
Architecting your WebRTC application for scalability, Arin Sime
 
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
CPaaS Conversational Platforms and Conversational Customer Service – The Expe...
 
Programmable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas GranigProgrammable Testing for Programmable Telcos, Andreas Granig
Programmable Testing for Programmable Telcos, Andreas Granig
 
How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...How to best maximize the conversation data stream for your business? Surbhi R...
How to best maximize the conversation data stream for your business? Surbhi R...
 
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel BourgoisLatest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
Latest Updates and Experiences in Launching Local Language Tools, Karel Bourgois
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
 
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
Master the Audience Experience Multiverse: AX Best Practices and Success Stor...
 
Open Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan QuayleOpen Source Telecom Software Survey 2022, Alan Quayle
Open Source Telecom Software Survey 2022, Alan Quayle
 
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei IancuOpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
OpenSIPS 3.3 – Messaging in the IMS and UC ecosystems. Bogdan-Andrei Iancu
 
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe LeitaoTADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
TADS 2022 - Shifting from Voice to Workflow Management, Filipe Leitao
 
What happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan QuayleWhat happened since we last met TADSummit 2022, Alan Quayle
What happened since we last met TADSummit 2022, Alan Quayle
 
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike BromwichStacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
Stacuity - TAD Summit 2022 - Time to ditch the dumb-pipe, Mike Bromwich
 
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
AWA – a Telco bootstrapping product development: Challenges with dynamic mark...
 
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João CamarateFounding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
Founding a Startup in Telecoms. The good, the bad and the ugly. João Camarate
 
How to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro GauciHow to bring down your own RTC platform. Sandro Gauci
How to bring down your own RTC platform. Sandro Gauci
 

Recently uploaded

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security

Editor's Notes

  1. Who is TeleSign: TeleSign Corporation is a Communications Platform as a Service company, founded on security, based in Los Angeles, California.[1] Founded in 2005, by Darren Berkovitz, Ryan Disraeli[2]and Stacy Stubblefield, is one of the Leaders in Digital Identity and Programmable Communications. TeleSign connects and protects online experiences with sophisticated digital identity and programmable communications solutions. Through APIs that deliver user verification, data insights, and communications we solve today’s unique customer challenges by bridging business to the complex world of global telecommunications.
  2. Hardware jobs often require adjacent degrees of knowledge, such as mechanical engineering, material engineering etc. Data science is an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from many structural and unstructured data.[1][2] Data science is related to data mining, machine learning and big data. Data Scientists are often mathematicians and physicists. Data Engineer is a worker whose primary job responsibilities involve preparing data for analytical or operational uses.
  3. A product manager is the person who identifies the customer need and the larger business objectives that a product or feature will fulfill, articulates what success looks like for a product, and rallies a team to turn that vision into a reality. The program manager is therefore responsible for the delivery of the output/product of the program, which will involve managing a portfolio of projects and programs. They coordinate the teams who are working on the various projects. However, they don’t manage the individual projects. That’s the purview of the project manager.
  4. Account takeover (ATO) means gaining access and control over a user account, with the goal of committing fraud. Hackers steal credentials, meaning sets of login usernames and passwords, in order to take ownership of a user account. Attackers often replicate their success by taking advantage of the high rate of password reuse across a user’s accounts. ATO attempts can be done manually by individuals or groups, or at scale using bots. Hackers will purchase lists of stolen credentials using black market sites or by extracting login data themselves. https://www.signalsciences.com/glossary/account-takeover-ato/
  5. 2FA adds additional layer of protection. Two-factor authentication (2FA) significantly decreases the risk of hackers accessing online accounts, blocking 96% of bulk phishing attacks. Prevent end-user account compromise and unauthorized access with two-factor authentication & customer identity data. ATO is fueled by the increase in daily massive data breaches, social engineering, phishing, and brute force attacks. Hackers gain access to personally identifiable information that leaves consumer accounts vulnerable to takeover. Online businesses that require users to enter login or registration credentials have a responsibility to protect accounts. Verify end-user identity and block spam at account registration using phone verification and intelligence-based fraud risk scoring. When new users are not verified at account registration, companies risk allowing bad actors into their user base. The damage caused includes user abandonment, negative brand impact, and decreased user base value. (Data from TeleSign's Fraud Report) Utilize phone intelligence to simplify the onboarding process for legitimate users while identifying and blocking risky users before they can do harm. These companies put their business and their legitimate users at risk by not verifying that each new user is who they say they are. On average, organizations surveyed spent $4M to respond to spam or fraud committed by unverified users. (Data from TeleSign's Fraud Report)