Wei Lin, VP Engineering Telesign: Jobs, Women in CS/IT Identity Security
Telesign's VP of Engineering Wei Lin presented to the Colorado School of Mines about women in the software industry and how to protect your identity in the ever-changing world.
4. Edit Subtitle
Insert Headline
Academia
• Research
• Teaching
• IT Backoffice
Industry
• Hardware
• Software
• Data Science
• Product Management
• Program Management
• Information Management
• UX/UI
5. Hardware
Circuit boards, routers, memory devices, IoT
devices
Software
The sky is the limit
Data Science
Data Scientist
Data Engineering
Database
Administrator
Design, implement, and maintain database
system
Jobs in Industry
Hardcore
6. Product Manager
Business focused
Program Manager
Project management
UI Engineer
UI design and development
Customer Support
Support customers
Jobs in Industry
Other
13. How Did I Get Where I Am Now?
B.S. Medical
Engineering (Fu
Dan Univ)
Ph.D. Medical
Imaging (Paris-
Sud Univ)
Post-Doctoral
Fellow (McGill
Univ)
Software
Engineer/Mana
ger (Leco)
Sr. Software
Engineer/Group
Leader (CAE)
Manager/Sr.
Director
(Symantec)
Lecturer (CPP)
Vice President
(TeleSign)
15. PLAN
Know what you want
Ask yourself what is your passion?1
Discover what is out there
Attend conferences, trade shows, job fairs2
Network
Go to meetups, networking events3
Seek advice
Talk to someone who has been in the field,
your school’s advisors, your family
4
Plan, plan, and plan
Set your goal(s)
Determine your timeframe
Construct your plan
5
16. Build your technical foundation and your soft skills
Study, Practice, Be Curious, Be Creative
Be a sponge
Learn as much as you can
Get an internship
See the real world
Ask “why”?
Have an inquisitive mind
Think outside the box
Try doing things differently
17. Identity-based security is an approach to control access to a
digital product or service based on the authenticated identity of an
individual.
Let’s dive into one topic: Account Take Over (ATO)
IDENTITY-BASED
SECURITY
18. What is Account
Takeover?
What: gain access and control over a user
account
Why: commit fraud
How: manual or automated using stolen
credentials
21. CONTACT US
13274 Fiji Way #600,
Marina Del Rey, CA 90292
(800) 850-3485 contact@telesign.com www.telesign.com
Editor's Notes
Who is TeleSign: TeleSign Corporation is a Communications Platform as a Service company, founded on security, based in Los Angeles, California.[1] Founded in 2005, by Darren Berkovitz, Ryan Disraeli[2]and Stacy Stubblefield, is one of the Leaders in Digital Identity and Programmable Communications. TeleSign connects and protects online experiences with sophisticated digital identity and programmable communications solutions. Through APIs that deliver user verification, data insights, and communications we solve today’s unique customer challenges by bridging business to the complex world of global telecommunications.
Hardware jobs often require adjacent degrees of knowledge, such as mechanical engineering, material engineering etc.
Data science is an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from many structural and unstructured data.[1][2] Data science is related to data mining, machine learning and big data.
Data Scientists are often mathematicians and physicists.
Data Engineer is a worker whose primary job responsibilities involve preparing data for analytical or operational uses.
A product manager is the person who identifies the customer need and the larger business objectives that a product or feature will fulfill, articulates what success looks like for a product, and rallies a team to turn that vision into a reality.
The program manager is therefore responsible for the delivery of the output/product of the program, which will involve managing a portfolio of projects and programs. They coordinate the teams who are working on the various projects. However, they don’t manage the individual projects. That’s the purview of the project manager.
Account takeover (ATO) means gaining access and control over a user account, with the goal of committing fraud. Hackers steal credentials, meaning sets of login usernames and passwords, in order to take ownership of a user account. Attackers often replicate their success by taking advantage of the high rate of password reuse across a user’s accounts.
ATO attempts can be done manually by individuals or groups, or at scale using bots. Hackers will purchase lists of stolen credentials using black market sites or by extracting login data themselves.
https://www.signalsciences.com/glossary/account-takeover-ato/
2FA adds additional layer of protection. Two-factor authentication (2FA) significantly decreases the risk of hackers accessing online accounts, blocking 96% of bulk phishing attacks.
Prevent end-user account compromise and unauthorized access with two-factor authentication & customer identity data. ATO is fueled by the increase in daily massive data breaches, social engineering, phishing, and brute force attacks. Hackers gain access to personally identifiable information that leaves consumer accounts vulnerable to takeover. Online businesses that require users to enter login or registration credentials have a responsibility to protect accounts.
Verify end-user identity and block spam at account registration using phone verification and intelligence-based fraud risk scoring. When new users are not verified at account registration, companies risk allowing bad actors into their user base. The damage caused includes user abandonment, negative brand impact, and decreased user base value. (Data from TeleSign's Fraud Report)
Utilize phone intelligence to simplify the onboarding process for legitimate users while identifying and blocking risky users before they can do harm. These companies put their business and their legitimate users at risk by not verifying that each new user is who they say they are. On average, organizations surveyed spent $4M to respond to spam or fraud committed by unverified users. (Data from TeleSign's Fraud Report)