Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
Career Convo & Core Skills
Share |

Career Conversations & Core Skills Video Recordings

Career Conversations gives WSC members the opportunity to connect with career professionals.  We'll discuss topics such as "What made them decide on IT or Cyber Security?, "What were some of their work/life challenges?" , "What skills and education do they see as essential to success?"


Core skills aka soft skills, are the personal character traits or qualities each of us has. They make up who we are, generally encompassing our attitudes, habits and how we interact with other people.

If you missed a session, enjoy the recorded sessions below.

Quick Jump:


April 14, 2015 - Guest: Barbara Shurtleff, VP and Sr. Director for Network and Security Engineering, SAIC

March 10, 2015 - Guest: Rebecca Weaver, Network Security Analyst at the Army Research Laboratory

February 10, 2015 - Guest: Stacey Halota, VP of Information Security and Privacy at Graham Holdings Company

January 13, 2015 - Guest: Cherylene Caddy, Director for Cybersecurity Policy National Security Staff

December 9, 2014 - Guest: Amber Schroader, CTO, Paraben Corporation

November 11, 2014 - Guest: Patrica Edfors, Vice President, Information Security and Compliance at Sirius XM Radio Inc.

October 14, 2014 - Guest: Annette Warren, Client Focused, Business Strategist, Creative Thinker and Entrepreneur. President/CEO iSECURE

September 16, 2014 - Elizabeth Schweinsberg, Incident Responder, Google Inc; and Jarilyn Hernandez, doctoral student in Computer Science at the West Virginia College of Engineering and Mineral Resources

July 8, 2014 - Guest: Dr. Margaret Leary, CISSP, CIPP/G, CRISC, Professor of IT/Cybersecurity at Northern Virginia Community College

June 10, 2014 - Guest: Tammy Torbert, Principal Solution Architect at HP and Dr. Char Sample,Security Solutions Engineer, Carnegie Mellon University

May 6, 2014 - Guest: Elizabeth Schweinsberg, Incident Responder, Google, Inc.; Tammy Torbert, Principal Solution Architect at HP; and Krysta, cyber security consultant.

July 16, 2013 - Panel Discussion - Achieving Success as a Woman in Cybersecurity

 


 

 

 

April 14, 2015

Guest: Barbara Shurtleff, VP and Sr. Director for Network and Security Engineering, SAIC

Bio: Barbara is responsible for  the corporation’s network strategy, technical design and operations.  Her past experience includes network operations support and engineering design for both  commercial and federal customers such as the US Department of Treasury and the US Patent and Trademark Office.  With her expansive experience she is able to bring a wealth of different network technologies, compliance and regulatory solutions to meet SAIC’s corporate expanding growth requirements.

Barbara holds a Bachelor of Science degree in Computer Science and is currently pursuing a dual Master’s degree in MIS and MBA from the University of Mary Washington. She holds active certifications in Project Management and Information Security Management from PMI and ISC2.

Barbara is an active member in the International Association of Privacy Professionals, Project Management Institute and ISC’s Security Professionals. She is an active supporter of youth equestrian programs presiding over Northern Virginias’ Dominion Valley Pony Club as District Commission.


 

 

 

March 10, 2015

Guest: Rebecca Weaver, Network Security Analyst at the Army Research Laboratory

Bio: Rebecca Weaver is currently a Network Security Analyst at the Army Research Laboratory in Adelphi, MD. Rebecca started off with an interest in programming in middle school, which soon turned to an interest in cybersecurity, when she first started using the tool, Cain and Abel. She attended Norwich University in Northfield Vermont, and majored in Computer Security and Information Assurance with a Concentration in Digital Forensics. While in college, she worked her way up from a Junior System Administrator to the Head of Operations at the Norwich University Center for Advanced Computing and Digital Forensics. On top of that she also spent one summer performing risk analysis, one summer working for the Center for Internet Security as part of their CERT, occasionally building websites for the Central Vermont Chamber of Commerce, and tutoring in C++ programming. After college, she went on to work for Tenable Network Security, as part of their QA team. Specifically, she was assigned to work on Security Center 4.8, 4.8.1, and 5.0. She currently attends UMUC, and is pursuing a Master's of Science in Cybersecurity.


 

 

 

February 10, 2015

Guest: Stacey Halota, VP of Information Security and Privacy at Graham Holdings Company

Bio: Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance and other data protection efforts. Halota has more than 20 years of experience in the information technology, security and privacy field. Before joining Graham Holdings, she served as the federal government and southeast region leader of Guardent (now part of Verisign), a security and privacy consulting and managed security services company. Prior to Guardent, she worked at PricewaterhouseCoopers in the Technology Risk Services consulting practice.

Halota was named Secure Computing Magazine’s 2009 Chief Security Officer of the Year, and was also named 2009 Mid-Atlantic Information Security Executive of the Year (Commercial Category) by the Executive Alliance. She is a Certified Information Systems Security Professional (CISSP), a Certified Information Privacy Professional (CIPP) and a Certified Information Systems Auditor (CISA).


 

 

January 13, 2015

Guest: Cherylene Caddy, Director for Cybersecurity Policy National Security Staff

Bio: Ms. Caddy currently serves as the Director for Cybersecurity Policy Integration and Outreach at the National Security Council within the White House. In this capacity, Ms. Caddy reports to the Special Advisor to the President for Cybersecurity and shapes national policies related to improving cyber protections among a broad set of stakeholders including federal, state/local/tribal governments, the private sector, and foreign partners. In particular, Ms. Caddy leads efforts on advancing cyber protections for state and local governments. She also overseas strategic initiatives to increase the security of cyberspace in the future, including the National Initiative for Cyber Education, and the National Strategy for Trusted Identities in Cyberspace, and development of the Federal Civilian Cyber Campus.


 

December 9, 2014

Guest: Amber Schroader, CTO, Paraben Corporation

Bio: Throughout the past two decades Ms Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed over two-dozen software programs designed for the purposes of recovering digital data from mobile phones, computer hard drives, email, and live monitoring services. With an aggressive development schedule, Ms. Schroader continues to bring forth new and exciting technology to the computer forensic community worldwide. Ms. Schroader coined the concept of the “360-degree approach to digital forensics”, pushing for a big-picture consideration of the digital evidence acquisition process. An accomplished curriculum developer and instructor; Ms. Schroader has written and taught numerous classes for this specialized field. Ms Schroader continues support through book contributions and other industry speaking engagements.


 


 

November 11, 2014

Guest: Patrica Edfors, Vice President, Information Security and Compliance at Sirius XM Radio Inc.

Bio: Patricia “Patty” N. Edfors, CISSP, CIPP, CISA, CISM, CSM is a recognized leader and trusted advisor with a more than 20 year successful track record in information risk, security, privacy and compliance management for U.S. and global organizations. Her experience spans the media and entertainment, government, healthcare, financial services, telecommunications and internet services industries. Currently, Ms. Edfors is the Vice President, Enterprise Information Security, Privacy, and Compliance where she heads up the information security, privacy and compliance programs for the entire enterprise which includes infrastructure, satellite, connected vehicle and streaming services. She serves as Chief Information Security and Privacy Officer. Prior to joining Sirius XM, Ms. Edfors held the position of Principal for Banrion Consulting, an information risk management consulting practice where Ms. Edfors was a co-owner.


 


 

October 14, 2014

Guest: Annette Warren, Client Focused, Business Strategist, Creative Thinker and Entrepreneur. President/CEO iSECURE

Bio: My passion is in running a business and working with people. I grew up in a family business and learned from a very young age that reputation is the barometer of success. I excel at pulling pieces together and making it work and I welcome a challenge. I like to be the best at whatever I do and my company's culture is a true reflection of our success. I like to be different, not to be different, but because I see everything in a unique way and I value the intricacies unlike most others. I partner only with those who share the same goals and value integrity as our company does.

iSECURE is known within the security community for providing leading security solutions and services. We are also known for our experience in networks and our focus on the client. We provide a full range of security services from assessment, vulnerability and penetration testing, to securing network infrastructure by implementing and managing on-site or cloud-based security solutions. We also offer professional services that augment department projects or architectural review to start at the beginning. We are selective as to the products and services we choose to associate with our name. iSECURE tests and chooses only one solution and post the value to our clients on our web sites products page. Unlike most resellers we to out on the limb and only choose one solution that we stand behind. Our engineering staff is CISSP and manufacturer-certified. Our technical expertise along with our deep rooted relationships with our customers, has resulted in the recognition of iSECURE as a Top 100 company of Rochester, NY, we hold a New York Certification as a Woman-Owned Business Enterprise as well as Beacon Award for Outstanding Ready for IBM Security Intelligence Solution.


 


 

September 16, 2014

Guest: Elizabeth Schweinsberg, Incident Responder, Google Inc; and Jarilyn Hernandez, third year doctoral student in Computer Science at the West Virginia College of Engineering and Mineral Resources

Bio:Elizabeth Schweinsberg is an Incident Responder with Google, Inc. working to keep the internal networks safe from malware, hackers, and the Internet. Ms. Schweinsberg has been in the computer industry for over a decade and in digital forensics since 2005 in both the Government and private sector. She has an MS in Information Security from Carnegie Mellon and a BS Computer Science from WPI.

Jarilyn is a third year doctoral student in Computer Science at the West Virginia College of Engineering and Mineral Resources. She received her BS in Computer Science from the University of Puerto Rico Arecibo Campus. As an undergraduate student she had the opportunity to participate in a summer internship at the University of Science and Technology and Missouri, where she works in the development of a robot that could measure the signal strength indoors. She also has a Master Degree in Computer Science from the Polytechnic University of Puerto Rico.


 


 

July 8, 2014

Guest: Dr. Margaret Leary, CISSP, CIPP/G, CRISC, Professor of IT/Cybersecurity at Northern Virginia Community College

Bio: Dr. Margaret Leary, CISSP, CIPP/G, CRISC, is a Professor of IT/Cybersecurity at Northern Virginia Community College. She serves as the Director, Curriculum of the National CyberWatch Center and has been a member of the NCC Leadership Team for the past 8 years. In addition to her academic and curriculum experience, Dr. Leary is a working cybersecurity practitioner with more than 25 years experience in the IT sector - the past 12 spent in senior level cybersecurity positions in the D.C. Metro region. She presently consults as a Senior Security Advisor with Camber Corporation, providing security consultation and risk/security assessment services to civilian and military agencies. Other related "extra curricular" activities include having served as an Advisory Board Member of Microsoft's Official Academic Curriculum (MOAC), and past member of ANSI-BBB Identity Theft Prevention and Identity Management Standards Panel, and ACM Working Groups. Dr. Leary has contributed to several published papers on issues with transferability between two- and four-year institutions, identity theft, and cloud security. She is presently leading a National task force of faculty at two- and four-year institutions focused on mapping college/university and CyberWatch model curriculum to the NICE Framework.


 


 

June 10, 2014

Guest: Tammy Torbert, Principal Solution Architect at HP and Dr. Char Sample,

Bio: Tammy is a Principal Solution Architect at HP, specializing in ArcSight. Tammy has worked her way up the IT ladder over the last 20 years, and has spent the last 8 years in a security focused positions, specializing in security operations, engineering, and architecture. Tammy is also our awesome CISSP class instructor.

Dr Sample is an academically and professionally experienced cyber security professional with over 19 years of experience in network security and software engineering. Internet security experiences include expertise with firewalls, IDS, IPS, Anomaly Detection, DNS, DNSSEC, Mail, routing, authentication, encryption, secure network architectures, cloud computing (IaaS, PaaS) and Unix internals. Experienced in designing and developing Internet security products. She is internationally recognized as the leading expert in quantitative cultural cyber threat intelligence. Publications include both academic and industry conferences and journals.


 

May 6, 2014

Guest: Guest: Elizabeth Schweinsberg, Incident Responder, Google, Inc.; Tammy Torbert, Principal Solution Architect at HP; and Krysta, Cybersecurity Consultant.

Bio: Elizabeth Schweinsberg is an Incident Responder with Google, Inc. working to keep the internal networks safe from malware, hackers, and the Internet. Ms. Schweinsberg has been in the computer industry for over a decade and in digital forensics since 2005 in both the Government and private sector. She has an MS in Information Security from Carnegie Mellon and a BS Computer Science from WPI.

Tammy is a Principal Solution Architect at HP, specializing in ArcSight. Tammy has worked her way up the IT ladder over the last 20 years, and has spent the last 8 years in a security focused positions, specializing in security operations, engineering, and architecture. Tammy is also our awesome CISSP class instructor.

Krysta, a graduate of Rochester Institute of Technology, has been a cyber security consultant in the Washington, DC area for the past four years. She is also the VP of Women's Society of Cyberjutsu.


 

July 16, 2013

Panel Discussion - Achieving Success as a Woman in Cybersecurity

Panelists::

Ann Barron-DiCamillo, Director at U.S. Computer Emergency Readiness Team (US-CERT)

Lisa Goldman, Senior Technical Recruiter, Federal Services Division at URS Corp.

Terry Gudaitis, Ph.D., Owner of Mindstar Security & Profiling

Andrea Suzara Bennett, President of Cloudburst Security

Margaret Leary, Ph.D., Co-Principle Investigator at the CyberWatch Center

Suzanne Hall, Vice President of Information Technology at the American Red Cross

Tammy Torbert, Information Security Engineer at HP Arcsight


Community Search
Sign In


News & Press
Calendar
Online Surveys