Articles
How to Land Yourself in A Dream Career in Cybersecurity
2 min read
Last week I had the wonderful honor of being a presenter in the Cisco Networking Academy Find Yourself in The Future Series. To date this series has attracted over 9000 live attendees, which is testament to the extremely high levels of interest in technology careers in this region as well as the extraordinary efforts of […]
On Letting Uniqueness Shine
1 min read
I am often asked about how I transitioned from a music teacher to a Data Privacy and Compliance Leader. Reflecting on my journey over the last 15 years, I have realized that it’s the same strengths that I demonstrated as a music teacher that have contributed to my success in the high tech sector. One […]
What It Means to be a Woman of Influence
2 min read
It was a wonderful honor to be named to Silicon Valley Business Journal 100 Women of Influence just over a week ago; one that will help greatly with accelerating my initiatives for cloud safety—not just for business, but also for us all. And for the honor, I owe much thanks to many incredible mentors who […]
The Seven Wonders of User Access Control: Part II
2 min read
In the first of a two-part blog series, The Seven Deadly Sins of User Access Controls, my colleague Jean Gordon Kocienda provided fresh insights into overly-permissive user access controls as a common underlying cause of data breaches. In this blog, I address the solutions to those “Seven Deadly Sins” with a modern twist on the […]
Cisco Empowered Women’s Network Sponsors San Jose State University STEM Challenge
1 min read
Last month Cisco Empowered Women’s Network (CiscoEWN) sponsored a San Jose State University STEM Challenge together with CloudNOW. The goal was to promote technology career paths for college women and to recognize students’ innovative efforts at San Jose State University. Through my involvement with CloudNOW, a non-profit organization whose mission is to drive the professional […]
New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data
1 min read
Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data. Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights […]
Bring Your Own Service: Why It Needs to be on InfoSec’s Radar
4 min read
Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]
Drivers for Managed Security and what to look for in a Cloud Provider [Summary]
1 min read
The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations can let business needs […]
Drivers for Managed Security and what to look for in a Cloud Provider
3 min read
The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations […]
7