YoVDO

Women in Information Security Panel - Challenges and Opportunities

Offered By: OWASP Foundation via YouTube

Tags

Career Development Courses Cybersecurity Courses Leadership Courses Mentorship Courses Gender Equality Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Listen to a panel discussion on women in information security, moderated by Joan Goodchild, featuring insights from female professionals at various career stages. Explore the challenges and opportunities for women in the field, including strategies to close the gender gap, best practices for managing diversity in organizations, and personal experiences of panelists. Gain valuable perspectives on topics such as career paths, mentorship, breaking stereotypes, and the importance of diversity in IT. Learn about initiatives to encourage more women to enter the information security field, including recruitment strategies, educational programs, and networking opportunities. Discover how cultural challenges can be addressed and stereotypes defused to create a more inclusive industry. Hear actionable advice for aspiring female professionals and organizations looking to improve gender diversity in information security.

Syllabus

Introduction
How did you get into information security
How are things changing in information security
Stepping up in information security
Taking on authority
Breaking the stereotype
IT vs other industries
Casual nature of IT
Female mentors
Other thoughts
Her motto
Her mentors
Trust
Diversity
Meeting people
Taking it back
Overlapping
Expanding a little
How to get more women in IT
Recruiting for skills
Benefits and skills
Audience questions
Grace Hopper Institute
Career fairs
Diversity in IT
Accenture
Representation
Cultural challenges
Defusing stereotypes
Respect
Digital natives
Women in leadership
Closing thoughts
Women in Technology
Alumni Group
Benefits
Action Items
Black Belt Holders
What Girls Can Code
Leveraging Social Media
Cultural nuances
Thank you


Taught by

OWASP Foundation

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network