Pursuing a career in cybersecurity is still a goal. Despite a few obstacles along the way. I am still committed. I joined WiCy. WiCyS is the only nonprofit membership organization with national reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring. I am thrilled to be part of a dynamic organization, women reaching out to other women.
“Each year, WiCyS holds an annual conference with a local host university partner – next year’s WiCyS Conference will be hosted by Carnegie Mellon University March 29-30 in Pittsburgh. The WiCyS Conference is an excellent opportunity for companies to connect with women students and candidates to recruit them into the field!”
Enjoyed the two days of Word Camp Seattle 2018. I learned more about WordPress, Content Strategy, how Gutenberg editing is the future for WordPress, staging and web site hosting. Thank you to the sponsors, speakers, volunteers and attendees who made the event a success. #WCSEA
This year was my sixth year volunteering at Seattle Give Camp; another fun weekend hack-a-thon. The group develops software tools and applications for non-profits in the Seattle area. The event took place at the Commons on Microsoft Campus in Redmond, WA.
This year I volunteered on a team of nine for La Leche League of Washington. Their focus is mothers who are breastfeeding their babies. My contribution to the team was planning, editing photos and creating graphics for the web site. The team migrated the Drupal web site to a WordPress web-site. A few challenges for the team, we solved them. We did attend a WordPress training session on Saturday, which was beneficial. for the team and La Leche League. La Leche League is an International organization, more details on their services here La Leche League of Washington
Sharing this article from Inc., because I believe in leading with kindness. Taking the time to listen to others and their life stories offers insight to who they are and what their values are. People are a valuable resource, not a commodity to be traded. Empathy, sincerity and vulnerability should be embraced as a strength, these traits are learned through experience and not a text book. People are individuals with potential to be outstanding team members with great ideas to share and make this a better world.
In the world of STEAM, women need to speak up and inform their peers on what projects they are working on and what is really happening in the workplace. If you need help or guidance speak up and be heard. I attached a link to an article that addresses actions women can take to improve their work environment and career. See link below.
You should be able to be yourself at work. It means treating everyone with kindness and treating people how you would like to be treated. All human beings are valuable, no matter what our differences or personal history. The best teams work together, everyone provides input and respects one another. Creating ideas to change the world evolves from working together, not against each other.
Recently, I earned a Certificate for Cyber Defense First Responder. The course covered the incident response process and the role of the Cyber Defense First Responder. Topics included identifying methods for Cyber Security Incident Response Team training and testing and testing.
Create an evidence map of your network and identify various types of evidence at each point, and document potential compromises for access points within the network. The tool Nessus Professional , a vulnerability scanner, was recommended in conjunction with the evidence map to prevent network attacks.
Another tool discussed and demonstrated was Windows Live Responsive. It is a forensic tool to collect and analyze data and evidence on a computer. We also imaged a hard drive and used write blockers to collect evidence. The Chain of Custody of any evidence gathered in an investigation is critical, document the process throughout the process. It is very important that you have authorization to examine a computer and any related evidence before you even begin download any data.
The course covered Rules of Evidence, legal processes, proof of expertise, licensing professional forensic tools for investigations , and cyber defense methodology. The hands-on demonstrations in class reinforced the skills and knowledge throughout the day. Overall, I expanded my cyber security knowledge base, learned how to use more forensic tools and had fun.