Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Egress

Myth Busting 101: Challenging stereotypes and grasping opportunities

As women in tech, the stereotypes put upon us – and particularly those we accept, internalise and resign ourselves to can become the mantras of our whole careers. From “not being technically minded enough” to being “unable to cope with the demands of the job”, our gender and ethnicities can dictate the positions we apply for and hold, and how far we’ll climb.

Human Layer Security Live - Quantifying human risk: The first step to a secure future - Ed Amoroso

Ed Amoroso, CEO at TAG Cyber LLC and former-CISO at AT&T Research shows sensitive data is put at risk due to email usage every 1.5 days – but in reality, this figure is much higher. That’s because more than half of CISOs rely on employees and their recipients to report email data breaches, despite this approach being inherently unreliable. As a result, CISOs are unable to accurately measure insider risk and deploy technology to properly mitigate it.