WoSV

WOMEN OF SILICON VALLEY

  • Interviews
  • Compilations
  • Index
  • About
IMG_9334.jpg

Carly Schneider (she/her)

January 10, 2020 by Kendrick Umstattd in 12 Women of Crypto

Carly Schneider (she/her) is a security engineer at Spotify. She is also working on a master’s degree in Computer Security. Currently, she enjoys thinking about security monitoring, security and usability tradeoffs, virtualization, and malware. 

1. What does cybersecurity and crypto mean to you? What is something you think people should know about this space?

Cybersecurity is the study of securing computer systems. Securing these systems means ensuring confidentiality, integrity, and availability at the correct level for the specific system. Crypto stands for cryptography, and it involves using math and logic. It is very useful because it helps keep the internet private and secure. Privacy and security are both cool, so, by inference, crypto is cool.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Ensuring everyone has secure access to the entire internet would be amazing. Giving unrestricted, accessible, and open information to people changes the world! Ensuring security keeps people safe and ensures they can take advantage of the information without fear. Unfortunately, the most powerless people tend to not have this access because of economic, social, and political realities. Safe access to information creates opportunities that can change lives.

3. What is a piece of advice that you have found especially useful? This can be either related or unrelated to tech.

My favorite reminder to myself is: mood follows action. I started telling myself this while climbing, because it can be scary! In the mountains, even when I am not feeling brave, I can decide to keep going, and I am often happy I did. I now use it everywhere. It is easy to go drink another coffee rather than tracking down the bug, just as it is easy to sleep instead of going to the gym. When things get hard or when something scares me and I do not want to continue, I remind myself that mood follows action. 

4. What's a challenge you've faced, and how did you deal with it?

I have a lot of trouble concentrating. This collides with the **ideal hacker** stereotype that requires you to stare at your computer and be productive for hours in a row. In reality, I am most productive when I leave my computer screen every 45 minutes. Understanding my strengths and applying them despite perceived or real pressure has helped me immensely. 

5. What is your favorite source of inspiration?

I have a lot of animal pictures on my desktop. 

6. What is your favorite book or movie?

My favorite book of 2019 is Exhalation by Ted Chiang. My favorite book of all time is Effective Modern C++ by Scott Meyers.

January 10, 2020 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Anna Cotter.jpg

Anna Cotter (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

1. What do cybersecurity and crypto mean to you?

It always amazes me to see people’s reactions when I tell them I work in cybersecurity. Especially among my high school friends, I am known in my community for my cooking and baking. Since I didn’t go to college right after high school, many think I was a stay-at-home mom. Instead, I pushed myself to go to college while working full-time. There were times when I would wake up at four in the morning just so that I could study while my children slept. It took me 22 years, but I ended up with a masters degree in Internet Security.

Ironically, I started my computer career in high school. My senior year was the first year that the high school had a PC. Since they didn’t have a lab or secure space for it, I would wheel it down and connect the monitor, printer, and keyboard everyday, then pack it back up in the evening. I was in charge of plugging everything in and booting it up. I knew just a bit more than my classmates about computers, so I became the expert.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Attacks on computer systems. As a cybersecurity professional, I have to find 500+ ways to keep the bad guys out. The bad guys only have to find one way to come in. It’s a constant battle that costs companies billions of dollars.

3. What is a piece of advice that you have found especially useful?

You are only given so much time and money to complete projects. I constantly have to tell myself, “Do the best you can in the time you’re given.”

4. What’s a challenge you’ve faced, and how did you deal with it?

I have faced forms of sexism in the workplace. Because I work with literally all men, they will frequently look at me and expect me to set up meetings, take notes, and file some of the materials for the department, even though there are 12 other people that could be doing these tasks. In fact, I was just asked again today to set up a meeting. Most of the time I don’t make a fuss, but every couple of months I bring up a presentation about gender bias to inform them of what they are doing. We call it the B presentation. At the end, everyone one has to pick a B word that is positive. My B word is blazing. I feel throughout my career I had to blaze my own path.

5. What is your favorite source of inspiration?

I am very religious. I find my greatest source of inspiration from the Bible and those who demonstrate Christ-like acts daily.

Anna is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Kelley Misata.jpg

Kelley Misata (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Dr. Kelley Misata (she/her) is a cyber and information security leader and speaker who combines over 15 years in leadership roles with a passion for facilitating critical conversations. Today, she is expanding her research on the security preparedness of nonprofits into a new venture, Sightline Security, with a mission to help underserved enterprises and community sectors.

Her role as President and Executive Director of The Open Information Security Foundation and past role as Communications Director at The Tor Project allow Kelley to spotlight her expertise in open source security, fundraising, advocacy, policy discussions, and training with an array of stakeholders. Kelley combines professional and research endeavors with a unique perspective as a survivor of cyberstalking. Kelley holds a Ph.D. in Information Security from Purdue University, a Masters in Business Administration and Marketing, and a Bachelor of Science in Marketing.

1. What do cybersecurity and crypto mean to you?

As a survivor of cyberstalking turned Ph.D. turned cybersecurity business owner, cybersecurity and crypto mean everything to me. What I think people need to know is that being more secure and understanding this dark, complicated, sometimes scary space is possible — and the security field has the responsibility of helping people understand how.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

I’m not sure there is one problem I could pick to solve in tech — primarily because in my view, cybersecurity extends far beyond tech. It’s about people, process, policies, laws, and technology all woven together.

3. What is a piece of advice that you have found especially useful?

You can do this! That advice was given to me by my mentor Becky Bace when I would say, “MBAs in marketing have no business getting a PhD in Infosec; what am I doing here?”

4. What’s a challenge you’ve faced, and how did you deal with it?

Entering security late in my career, I felt as though I had numerous strikes against me — 1) I didn’t start my career in computer science or technology, 2) I was a woman, 3) I was a victim, 4) I was not a developer, and more.

5. What is your favorite source of inspiration?

The incredible thought leaders in this field who allow all of us to stand on their shoulders when they get tired.

Kelley is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Marcae Bryant-Omosor.jpg

Marcae Dimeitria Bryant-Omosor (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Mrs. Marcae Dimeitria Bryant-Omosor is a Software Developer. She is active on a few community boards, where she is instrumental in promotion of volunteerism and community STEM efforts.

Mrs. Bryant-Omosor is a graduate of University of Arkansas Little Rock, where she obtained her Bachelor of Science in Computer Science. She recently graduated from Saint Leo University, where she completed her Master of Science in Cybersecurity.

With 20 years of experience in Information Technology (I.T.) Operations industry, Mrs. Bryant-Omosor has turned her attention towards software development to increase her knowledge base and fine tune her information security (I.S.) skillset. She also wants to utilize her military intelligence expertise, obtained over 10 years in the United States Airforce.

1. What do cybersecurity and crypto mean to you?

“Crypto” refers to digital currency or blockchain, which is the future of money. It’s great to have cryptocurrency that can enhance the dated paper currency system; however, it also exposes new concerns about security and protection of consumers’ digital assets. Hackers are ready to exploit the crypto network and disrupt cybersecurity infrastructure on a global scale. Measures need to be taken to develop legal regulations and compliance measures, in addition to globally hardening the digital footprint.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Close the skills gap for underrepresented populations in the IT and cybersecurity realm.

3. What is a piece of advice that you have found especially useful?

Once you make a goal, take the time to chart out a path to reach it. Only then can you achieve it and continue to adjust your path as necessary.

4. What’s a challenge you’ve faced, and how did you deal with it?

My biggest challenge was becoming a mother, because I wanted to be the best role model for my children. In becoming my idea of the best mother, I have made many career pivots that made me feel disconnected and unfulfilled. However, I now understand that there is time to reach my goals and aspirations.

5. What is your favorite source of inspiration?

Most definitely my family. My husband is my best friend and confidant. He encourages me to pursue my goals and elevate myself. Of course, my children are my inspiration too, as I aspire to be someone they admire.

6. What is your favorite book or movie?

The Giver by Lois Lowry.

Marcae is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Mari Galloway.jpg

Mari Galloway (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Mari (she/her) is the CEO and a founding board member for the Women’s Society of Cyberjutsu (WSC), one of the fastest growing 501c3 non-profit cybersecurity communities dedicated to bringing more women and girls to cyber.

Mari began her cyber career with Accenture, where she excelled as a Network Engineer. With over 9 years of Information Technology experience, 8 of which are in cybersecurity, she has an understanding in areas that span network design, risk assessments, incident response, and policy development. She holds a variety of technical and management certifications (CISSP, GIAC, CCNA, etc), as well as a Bachelor’s degree in Computer Information Systems from Columbus State University and a Master of Science in Information Systems from Strayer University.

Mari is currently a resident of Las Vegas, working to secure the gaming industry of the Southwest as a Sr. Security Architect. She regularly contributes content to security blogs, trains companies across the country, and serves as an Adjunct Professor for UMUC. Outside of being a geek, Mari enjoys art, puzzles, and legos! You can find her online at @marigalloway.

1. What do cybersecurity and crypto mean to you?

To me, cybersecurity means protecting data from being destroyed, stolen, or misused. It means gaining the trust of your users to keep them safe. It also means implementing tools and applications that are secure but don’t disrupt the business.

Cyber security is a challenge that will never go away. As long as we are connected virtually, we will have to face the challenges of security. And that’s the fun part!

2. If you could wave a magic wand and solve one problem in tech, what would it be?

The hiring and recruiting process. There are so many talented, passionate, hungry women, men, minorities, whatever that don’t get the opportunity because they aren’t “cut from the right cloth”. Companies tend to revert to traditional ways of bringing in talent, but that talent pool is tapped. You have to get comfortable with being uncomfortable. Reach outside those networks and go places unexpected to find the talent.

3. What is a piece of advice that you have found especially useful?

I have been fortunate to have a few people in my life provide some great advice without even realizing it. For example: people will be negative no matter what. No matter how happy or positive you are, someone will try and negate that. I have learned to take that negative energy and use it to fuel my growth in- and outside of cyber and tech. I am in control of my journey and negativity is just a stepping stone along that journey.

4. What’s a challenge you’ve faced, and how did you deal with it?

While I can talk to anyone about anything, I am an introvert at heart. Large crowds make me nervous. To overcome this, I make a point to speak to at least three new people no matter where I go. It helps me meet new people, and could even potentially help that person. You never know what people are going through; your saying hello could totally change their perspective.

5. What is your favorite source of inspiration?

YouTube — whenever I need to get motivated or have something to learn, it’s the perfect place.

6. What is your favorite book or movie?

Teen Witch, the original movie. :)

Mari is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Lisa Kimball.JPG

Lisa Max Kimball (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Lisa Max Kimball (she/her) is a results-driven executive with extensive experience in business operations and performance management, data analytics, identity and security management, cyber privacy, and service delivery.

As a strong manager and dedicated coach, she enjoys mentoring staff, volunteers, patients, students, and clients as they strive to attain upward mobility and maintain optimal performance levels.

Lisa is passionate about creating “intentional collisions” by identifying strategic personal and professional opportunities and capitalizing on long-lasting partnerships. She fervently believes that each person deserves every chance to lead their best life; as such, she relishes opportunities to shift mindsets and change hearts as an advocate and community-builder.

1. What do cybersecurity and crypto mean to you?

As a lover of language, I’m delighted by this question — thank you for asking it! “Crypto” is one of those buzzwords that sounds all new and exciting and techno-cool (especially when paired with words like “currency”), but the term — meaning secret or hidden — has been around for millennia.

Similarly, “cyber” is predominantly used as a synonym for “computer”. So, to me, crypto and cybersecurity mean keeping safe data that’s collected, stored, and/or processed on an electronic device.

I share all of that because I think people, especially young students, should know that classes and jobs that contain “crypto” or “cyber” in their descriptions are most effectively filled with students and workers who love language. Yes, of course, mathematics plays an integral role in devising logical solutions and developing algorithms, but computers are incapable of doing much of anything in the absence of someone who “speaks their language”.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Trust.

We’re a cautious species by nature and by necessity, but the continued lack of trust between attribute providers and relying parties significantly, and ironically, hinders progress.

3. What is a piece of advice that you have found especially useful?

Listen.

Never presuppose an answer, and never predetermine who’s going to have the best answer. Begin with a concise problem statement, then solicit input from those most familiar with the topic — regardless of their educational accomplishments, professional roles, or their place in the proverbial pecking order — and then listen. Truly, deeply, respectfully listen.

4. What’s a challenge you’ve faced, and how did you deal with it?

I am the daughter of one, the ex-wife of one, and the mother of two wonderful humans who live with mental illness and substance use disorders. While a lifetime of personal experiences may not qualify me as an expert in the field, facing the associated challenges have predisposed me to a level of understanding and commitment to bettering the lives of those who live with mental illness, along with those who live with and care for them.

5. What is your favorite source of inspiration?

This can change by the minute. I’m exceptionally curious, and I’m a voracious reader; a few sentences on a cereal box can inspire a whole new line of inquiry for me to follow.

6. What is your favorite book or movie?

I could no sooner choose a favorite star in the heavens than a favorite book. I’ll start with Harriet the Spy by Louise Fitzhugh, end with The Cyber Effect by Dr. Mary Aiken, and leave it to your imagination, Gentle Reader, to consider all of the in-betweens.

As for favorite movies — the first two answers that come to mind are My Cousin Vinny and The Birdcage.

December 22, 2019 /Kendrick Umstattd
cybersecurity, Crypto, Cryptography, Women in Tech
12 Women of Crypto
Malia Mason.jpg

Malia Mason (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Malia (she/her) is an experienced cybersecurity engineer and the recent co-founder and CEO of Integrum, a cybersecurity consulting firm focusing on security compliance for small businesses and non-profit organizations. She is also the current president and co-founder of the Women in Cybersecurity (WiCyS) SoCal Affiliate, as well as Chair of the Technology Committee for AnitaB.org.

Malia served on active duty in the Navy for 4 years, where she was a lead computer technician. She is an active member of ISSA, ISACA, OWASP, IAPP, AnitaB.org, Women in Cybersecurity, and Women’s Society of Cyberjutsu. A champion for women and minorities in technology, she serves on the advisory board for Long Beach City College and mentors students in various community colleges around Los Angeles. She has mentored girls in middle school and high school at several cybersecurity camps and events.

1. What do cybersecurity and crypto mean to you?

I have always wanted to help protect people in some way. While serving in the Navy, our secret systems and information were entrusted to me. I took that job very seriously, as I saw how the release of that information could potentially harm a lot of people, military personnel and civilians alike.

In the civilian sector, I have been a staunch advocate of privacy rights; cybersecurity education; and blue-teamers, who work to defend our systems and information from attackers. I have developed talks and workshops to bring cybersecurity understanding to people in desperate need, like victims of domestic violence, immigrants, ESL , elderly, etc. Everyone needs to understand and care about cybersecurity!

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Barrier to access and entry.

3. What is a piece of advice that you have found especially useful?

When you get your foot in the door, hold it open so more people like you can come in behind you.

4. What’s a challenge you’ve faced, and how did you deal with it?

I have frequently been the first and only woman in my workplace. I joined women’s organizations outside of work and have become a leader in several groups. I work to bridge the gap between men and women in the workplace and always offer myself as a safe person to talk to for everyone. When I am slighted, ignored, or mistaken for the secretary, it is in my service of others that I gain my confidence and inspiration to power through those challenges. I am always trying to leave the world better than I found it. If I make it so the next woman has a better environment than I had, I consider myself successful.

“If I make it so the next woman has a better environment than I had, I consider myself successful.”

5. What is your favorite source of inspiration?

I like to channel my fierce Granny. She encouraged me from a young age to get involved with politics and to stand up and say something if I felt it wasn’t right. She never let me forget that she was born during a time when women did not have the right to vote, so I had better get involved to make sure we’re always pushing the bar forward!

6. What is your favorite book or movie?

Pride and Prejudice.

Malia is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Alyssa Columbus.jpg

Alyssa Columbus (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Alyssa (she/her) is a Data Governance Specialist and member of the Spring 2018 Class of NASA Datanauts. Previously, Alyssa has worked as an information security analyst, data scientist, and machine learning researcher, and she has a wide variety of experience in all aspects of data management, including data science, engineering, security, and governance. Her award-winning work has been featured by many publications, including Forbes, O’Reilly Media, Kaggle, Dataquest, and Microsoft’s Revolution Analytics blog. Alyssa is the founder of R-Ladies Irvine and holds a degree in Mathematics from the University of California, Irvine.

1. What do cybersecurity and crypto mean to you?

For me, working in cybersecurity is an incredible opportunity to work with data at a much larger scope than I had previously in data science and engineering. I’ve always enjoyed working with data, and I’ve found that as I’ve learned more and more about data security, privacy, and governance, I have a much more complete picture of how critical the management of data can be to an organization’s success. As the amount of data produced and regulations to keep sensitive data private are rapidly increasing, so will the demand for skilled professionals who can protect data, manage its use, and ensure it’s a valued asset that organizations can use for improved decision-making and greater mission effectiveness.

One thing I love about the cybersecurity space is that people of all backgrounds are welcome. Technical or non-technical, degree or no degree, there is an increasing abundance of jobs for almost everyone.

2. What is a piece of advice that you have found especially useful?

You are the CEO of your own life. You have the freedom to choose what matters to you, define a vision and plan for your success, and work hard with people who support you to achieve it.

3. What is your favorite source of inspiration?

I’ve always been inspired by my dad. His hard work and advice to always be kind influenced me to work hard and earn everything that I have today in my career.

Alyssa is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Hannah Tun.jpg

Hannah Tun (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Hannah (she/her) currently works as an IT Security Analyst on a contract at Lands’ End. She is a Certified Information Privacy Technologist (CIPT) with extensive knowledge of privacy laws and data privacy management. Hannah is currently preparing for the Certified Information Systems Security Professional (CISSP) and AWS Certified Security Speciality exam.

Hannah worked for almost a year as a Cyber Forensic Analyst, investigating email compromise cases, getting hands-on experience in SQL and ETL programs like Pentaho, and writing scripts from scratch. Before graduating, she worked at PwC as an IT Risk Assurance Intern, conducting IT audits for the third largest telecom company in Myanmar.

Hannah is a double Hoosier alum, with a Masters of Science in Information Systems and a Bachelors of Science in Finance, Technology Management, and Corporate Innovation.

1. If you could wave a magic wand and solve one problem in tech, what would it be?

“Easy managing” for large IT enterprise systems.

Whether it be moving toward cloud services, baselining firewall configs, remediating frontend and backend vulnerabilities, or responding to phishing attacks, it’s proven very hard to coordinate any change, both from a technology and management perspective. I’d love for departments to collaborate faster without pointing fingers, and for upper management to be more proactive and understanding. It would definitely help Security Departments do their jobs more efficiently.

2. What’s a piece of advice you’ve found especially useful?

Try to take a step back whenever you’re facing a barrier. Run every task to the ground. This has served me tremendously when it comes to both forensics investigations and personal life challenges.

3. What’s a challenge you’ve faced, and how did you deal with it?

Finding a cybersecurity job where I can receive great mentorship. Mentorship is so important in advancing my career, and a lot of companies I’ve worked for or interviewed with do not emphasize it.

To overcome this, I’ve begun looking into alternatives for advancing my career. I’ve invested lots of time into researching scholarships to mitigate the financial restrain of pursuing a SANS certificate, affiliating with professional organizations that can help me expand my network, and reaching out to new contacts for advice. I’ve learned to commit to my career in new, robust ways.

4. What is your favorite source of inspiration?

My peers and mentors.

Hannah is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Lesley Carhart.jpg

Lesley Carhart (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Lesley (she/her) is a Principal Threat Analyst at the industrial cyber security company Dragos, Inc. She is recognized as a subject matter expert in cybersecurity incident response and digital forensics, regularly speaking on the topic at conferences and universities. Lesley has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy focus on response to nation-state adversary attacks. Her focus at Dragos is developing forensics and incident response tools and processes for uncharted areas of industrial systems.

In 2017, Lesley was named a “Top Woman in Cybersecurity” by Cyberscoop and received the Guidance Enfuse conference “Women in Technology” award. She currently serves as a NCO in the US Air Force Reserves and coaches youth martial arts in her free time.

1. What do cybersecurity and crypto mean to you?

Cybersecurity is the art and science of improving the security posture of individuals and organizations by detecting, mitigating, and deterring threats. “Crypto” will always be shorthand for cryptography to me — a broad and fascinating field that involves mathematics, code, and data privacy. Crypto can allow us to send data confidentially, better validate its source, and verify its integrity upon receipt. It is integral to our privacy and security.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

I’d make essential security measures like secure authentication and defense against internet scams more approachable to general users. When users fail to practice basic security hygiene or evade security measures, it’s almost always our fault as technologists for making things too complex and arcane. Usability is improving, but we still have a long way to go.

“When users fail to practice basic security hygiene or evade security measures, it’s almost always our fault as technologists for making things too complex and arcane.”

3. What is a piece of advice that you have found especially useful?

Never stop learning, and never assume you can’t learn something. Our field is constantly changing — knowledge becomes out of date in weeks or months. You must remain curious and have a deep desire to learn continually from the day you start your career until the day you retire. A degree or certification is nice, but will only get you so far.

4. What’s a challenge you’ve faced, and how did you deal with it?

Being a consultant in cybersecurity typically requires a great deal of travel — sometimes weeks of the month away from home, working extreme hours, and eating on the road. Work-life balance can become very challenging. As I’ve become older, I’ve discovered the importance of structuring time for myself. Many consultants in our space have felt burn out, and most of us have been left with some kind of health issues as a result. It’s life-changing.

I’d tell anyone who needs to hear it to take a real vacation every year — even if it’s just at home. You must structure your work so that you can eat, sleep, and exercise long-term. Get routine physical exams. If your employer is not allowing you to stay physically and mentally well, they are not a good employer. When you’re young and ambitious, it is easy to scoff at these things. The day you finally end up in the ER or you simply can’t force yourself to care about work anymore, you’ll feel very differently.

“If your employer is not allowing you to stay physically and mentally well, they are not a good employer.”

5. What is your favorite book or movie?

I love Issac Asimov’s short stories, particularly the ones featuring Susan Calvin. She was one of the first strong representations of a woman computer scientist in fiction, and she really inspired me as a kid.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Elizabeth Smith.jpeg

Elizabeth Smith (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Elizabeth (she/her) is an MBA candidate at the University of Oxford. Born and raised in Washington, she moved to California in 2014 to attend Santa Clara University and intern as a software engineer in the Silicon Valley tech scene. She holds both a BS and MS in Computer Science from Santa Clara and Oxford, respectively, and specializes in cybersecurity. In her free time, Elizabeth enjoys playing the harp, snuggling with yellow labs, drinking coffee, and running.

1. What do cybersecurity and crypto mean to you?

Since cybersecurity is such a vast field, I’m struggling to develop a singular idea of what it means to me. Skip the next couple paragraphs if you don’t want a math lesson. :-)

I see cryptography as using the most beautiful phenomena from mathematics to make sure that all of the data we create and technology we use is safe from exploitation. Having studied it in both undergrad and grad school, I’ve come to realize how incredible the math that serves as the foundation for public and private key encryption, smart contracts, digital signatures, hashing, and decentralized consensus algorithms is.

Crypto is “beautiful” because much of it relies on problems that are computationally intractable, particularly those from number theory. For example, prime factorization is the process of factoring an integer (N) into its prime factors (a, b). To find N, all we have to do is multiply its prime factors together. Even if N is insanely large (hundreds of digits), computers can quickly arrive at this product. The inverse is not true, however. Given a sufficiently large N, finding its prime factors will require too much time and/or computational resources, assuming a quantum computer isn’t running Shor’s algorithm. Clearly, the difficulty and resources required to solve for a given variable in this single equation (N = a*b) varies significantly. We leverage the dualistic property of many intractable problems by giving authorized systems the “easy” calculation and unauthorized systems (i.e. hackers) the “hard” calculation. This keeps our data and networks safe!

“We leverage the dualistic property of many intractable problems by giving authorized systems the “easy” calculation and unauthorized systems (i.e. hackers) the “hard” calculation. This keeps our data and networks safe!”

There’s so much “buzz” around fields like deep learning and robotics, which I think has made cybersecurity deeply underrated; the R&D in cyber is very exciting. Blockchain is being applied to elections to prevent voter fraud, protocols for device authentication and security are being redesigned in the face of 5G, machine learning is being conducted on encrypted datasets the size of terabytes, and new mathematics that are quantum resistant are being discovered. And these are just a few of the cool things going on right now!

Cybersecurity will also never become obsolete. Even as technologies evolve and are tweaked to near perfection, the threat of human error will persist. There will always be people who continue to click on phishing emails, write their passwords on post-its which are then lost, or charge their devices with malware-infected lightning cables. This is why social engineering is critical to preventing cyber-attacks.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Diversity and inclusion initiatives in tech! Shocker.

Specifically, measures aimed at retention, as opposed to recruitment. I’ve witnessed and participated in my fair share of tech D&I over the years — companies that assign you to a “diversity” recruiter, scholarships with lengthy eligibility conditions, Lean In circles, and women in STEM conferences, to name a few.

I don’t think convincing talented minorities to join companies or pursue technical degrees is the primary problem. It’s one thing to open an opportunity to someone, but it’s another to actually create an environment where that person can flourish. Hiring a qualified woman but not giving her any support or tools to navigate the male-dominated tech space often does more harm than good.

“It’s one thing to open an opportunity to someone, but it’s another to actually create an environment where that person can flourish.”

This is why initiatives that focus on retention are so important. Improving them can help reduce cases of harassment, imposter syndrome, and other consequences of the homogeneous and sometimes, hostile, tech sphere. Even if companies change their culture, it’s impossible to convince every employee to do the same. So this problem is also at the team level, which is why it’s so complex and nuanced.

3. What is a piece of advice that you have found especially useful?

Don’t be quick to judge — there’s always a reason for someone’s actions.

I struggle with this each day, whether I’m collaborating with a classmate who came unprepared, buying groceries from a cashier who didn’t acknowledge my hello, complaining about the design of a product, or ridiculing a politician’s latest interaction with the press. I’m not saying that the reason for a person’s actions is always right, but I think we all need to put more effort into understanding one other, or at least trying to empathize.

4. What’s a challenge you’ve faced, and how did you deal with it?

Enrolling in an MBA program at age 23.

This past September, I graduated with a Master’s (MSc) in Computer Science. A couple weeks later, I began my MBA. To be honest, I expected my transition to the MBA program to be much easier. In fact, I’m nearly three months in and still don’t feel adjusted or particularly excited by my coursework.

During my MSc, I had to deal with moving to a different continent and studying at a new school (University of Oxford) at the graduate level, yet I found that transition to be a lot easier than this year’s. For one, the subject was familiar to me, as I had studied Computer Science/Physics/EE extensively in undergrad; the MSc in Computer Science was a natural academic progression for me.

The MBA is an entirely different experience. Before September, I knew *nothing* about business. I couldn’t even explain the difference between revenue and profit! The average age of my peers in the cohort is 28, which means that even those who didn’t enter with a business degree were at least familiar with the lingo from years of work.

I’ve spent hours reading case studies riddled with terminology and references that are foreign to me yet “common knowledge” in the business world. I’ve chatted at networking events with McKinsey employees, and still had no clue what they actually do. I’ve worked through Wall Street Prep Excel tutorials, but am still not able to model a simple linear regression.

I’ve felt this discouragement and imposter syndrome make me question if I’ll be successful in a job post-graduation. I realize it’s an unhealthy mindset, so I’m trying to be more aware of when I enter the downward spiral. It’s really tough, but it’s getting easier with practice. I might not reach concepts as quickly as my peers, but the important thing is that I keep pushing myself and don’t belittle my successes by measuring them against those of my peers.

5. What is your favorite source of inspiration?

I’m an introvert, so I often find I’m at my most productive and inspired when I’m alone. My best times are probably when I shower or go on early morning walks/runs in the meadow near my college.

Instagram is also a great place to source creativity and exchange ideas. My go-to Instagram handles of late are:

Thought-provoking: @melindafrenchgates, @mariashriver, and @esrigram.

Adorable: @mybestfriendhank and @tuckerbudzyn.

6. What is your favorite book or movie?

Books:

Grit by Angela Duckworth. This book is a must-read. Through numerous science experiments, Duckworth (a fellow Oxford grad) shows that grit is the single most important factor in determining success. I’ve never been naturally “gifted” — I had tutors for math and reading in grade school, my SAT and GRE scores were abysmal, and it still takes me at least twice the amount of time of my peers to complete a problem set. Grit is a positive reinforcement on the power of showing up, putting in effort, trying again, and having a passion and purpose for what you do.

The Life-Changing Magic of Tidying Up by Marie Kondo. It’s remarkable how a clean and organized room makes for a much clearer mind and positive mindset.

Movie:

My dad recently sent me a USB stick loaded with dozens of home videos from the first decade of my life. It’s very entertaining!

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Florentina Ferati.jpg

Florentina Ferati (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Tina (she/her) works as a Lead Security Engineer at Facebook, protecting Facebook’s most sensitive data and corporate infrastructure. Day to day, she leverages her digital forensics, investigation and data analytics skills to solve complex cases and improve the security posture of corporate and production environments. Another big part of her role is working alongside software engineers to improve detection systems and response capabilities to mitigate and defend against large scale threats.

1. What do cybersecurity and crypto mean to you?

In today’s society, much of our lives and activity is digital. Back in the day, we kept our most sensitive things at home, at a bank, or in a secure vault, whereas today, most, if not all, of our sensitive information lives online, making cybersecurity everyone’s problem and priority; we all want our data to be safe and secure.

During middle school, when I had just gotten WiFi at home, I remember receiving tons of “interesting” emails to my newly created account. Being new to the Internet, I assumed that the messages I received must be valid, so one day I fell for an enticing offer to become a millionaire. The only thing between me (a teenager) and millions of dollars of heritage was a money transfer of a few hundred dollars via Western Union… I think we all know how this type of story ends: I was a few hundred dollars poorer and not a millionaire.

I didn’t realize it at the time, but I think this experience was one of my unconscious drivers towards cybersecurity. To me, cybersecurity really means enabling people to feel safe and protected in a virtual environment as much as, or even more than, in the physical world. It also means making it possible for everyone to have the resources they need to understand basic security concepts and avoid common pitfalls of social engineering, spear phishing, and other attacks.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Making security and privacy tools easy to understand, more adaptable, and more intuitive to the general population, while at the same time not sacrificing the technical features that these tools need to outpace adversaries.

3. What is a piece of advice that you have found especially useful?

Speaking up on things you believe in truly matters.

Many times throughout my career, especially when starting a new role, I’ve experienced imposter syndrome and found myself hesitant to share my thoughts; I told myself that the people around me were exceptionally smart and already knew what they were doing. It took me a while to internalize that my ideas really do matter, and that I play a crucial part in shaping not only the future of my own growth, but also that of my team. Your authentic voice will drive change and provide a diverse perspective to solving challenging problems.

4. What’s a challenge you’ve faced, and how did you deal with it?

Backing up your ideas with data and knowing the “why”! When you feel passionate about something, it’s easy to assume that everyone else will feel the same way, but that’s not always the case; having the “why” ready to support your idea is key.

I’ve learned this the hard way on many occasions, but they ultimately helped me realize that while the need for cybersecurity is hard to measure and articulate, it’s not as hard as we might think. If spaceflight companies know how to measure their success metrics, I’m sure we can do the same for cybersecurity!

5. What is your favorite source of inspiration?

People I love and care about.

6. What is your favorite movie?

There are many movies I like, but one of my favorites is The Shawshank Redemption.

December 22, 2019 /Kendrick Umstattd
Crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Maddie Stone.jpg

Maddie Stone (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Maddie (she/her) works at the lower levels of computers, amongst the bytes and the circuitry, to try to prevent bad actors from using technology to exploit people. She’s done this through reverse engineering: hardware, software, and everything in between.

Maddie currently works for Google Project Zero as a Security Researcher where she works to make zero-days (the previously unknown vulnerabilities/exploits) hard. To do this, she looks for the same 0-day vulnerabilities in commonly used software and devices as the malicious actors, but instead of exploiting those vulnerabilities, she reports them to the vendor to get them fixed.

Prior to joining Project Zero, Maddie led a team of reverse engineers within Google’s Android Security team who hunted malware in the Android ecosystem.

1. What do cybersecurity and crypto mean to you?

Crypto means cryptography. Cryptography has never been my strength in the security space. I took a Modern Cryptography class as an undergrad, because I thought it sounded cool, but it turned out to be all mathematical proofs and a graduate-level course. Thankfully, I had a professor who helped me get through it, and we both realized that I love the applied work much more than the theoretical.

Reverse engineering has been my beloved niche in the cybersecurity field. To me, it’s meant getting to help people by solving puzzles all day. I work to put the pieces together of how a piece of software or a device, like a phone, works and then determine if it could harm users. The feeling of uncovering the answers and helping people is pretty great.

While my job could also be described as “hacker”, I don’t wear black hoodies, and there’s plenty of space in this field for anyone who likes to creatively solve puzzles and help people, regardless of whether you wear a black hoodie or not.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

If I could immediately solve one problem in tech, it would be that everyone could have private and secure access to the Internet, regardless of how much they pay for their device or access. Today, the less expensive devices and tiers of access are subsidized by selling the user’s data, installing malware, carrying out fewer security reviews, etc. But if everyone could be secure and still have access to information, I think it would do a lot for global equity and equality.

3. What is a piece of advice that you have found especially useful?

“The most damaging phrase in the language is: it’s always been done that way.” — Grace Hopper

This constantly reminds me to question, “Why is it done like this?” Is it just habit, which we need to re-evaluate and propose alternatives, or is there a legitimate reason this is the best way to get the thing done?

4. What’s a challenge you’ve faced, and how did you deal with it?

Working in a field where you see almost no one else who looks like you can be hard for a myriad of reasons. One of the ways it manifests for me is a different version of “imposter syndrome”: I don’t necessarily question if I belong or have earned my spot, but other people do.

While I know belong here just as much as anyone else, hearing the doubt and feeling the need to prove myself to others can take its toll. While I can still fall into self-doubt, I’ve found that calling out the double standards, talking about it publicly, and telling trusted friends and co-workers that I could use some external validation helps me move past the negative comments. I’m able to recognize they’re not a reflection of my worthiness to be in this field.

5. What is your favorite source of inspiration?

It’s hard to admit, but I am often inspired (and sometimes tear up) from the inspirational, cheesy quotes on Instagram. How can you not want to go out into the world and kick butt after seeing just the right words in white block font on a solid-colored background?

6. What is your favorite book or movie?

I never get tired of watching Legally Blonde. The whole time she stays authentically herself…and it cracks me up the whole time.

December 22, 2019 /Kendrick Umstattd
Women in Tech, Crypto, cybersecurity, Cryptography
12 Women of Crypto
Kristina Balaam.jpg

Kristina Balaam (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Kristina is a Security Intelligence Engineer at Lookout where she reverse engineers mobile malware. Prior to Lookout, she worked as a Mobile Application Security Engineer at Shopify, securing the company’s Android applications. Kristina graduated with a Bachelor of Computer Science from McGill University in 2012 and is currently pursuing a MSc. in Information Security Engineering from the SANS Institute of Technology. She blogs about computer security on Instagram, Twitter, and Youtube under the handle @chmodxx.

1. What does cybersecurity and crypto mean to you? What is something you think people should know about this space?

To me, cybersecurity means the freedom to safely innovate on products that have a significant positive impact on people’s lives. Securing the applications and products we build is vitally important; these products can do so much harm without adequate security measures in place. I think it’s important that people understand that the security of our data and technology may not excite some people the way new features do, but it’s a necessary part of being able to live in a networked, connected world.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Bias against those underrepresented in the industry.

3. What is a piece of advice that you have found especially useful? This can be either related or unrelated to tech.

Don’t be afraid to ask questions. I meet so many people who feel they need to know everything in their industry or niche. Those who belittle others for asking questions aren’t worthwhile mentors. You stunt your growth by being afraid to raise your hand.

4. What’s a challenge you’ve faced, and how did you deal with it?

Believing I was competent — I would second-guess myself constantly. I still struggle with it sometimes, but I’ve learned to gather empirical evidence and use it to silence the “imposter syndrome” side of my brain.

5.What is your favorite source of inspiration?

Cybersecurity professionals sharing their stories of making the world a better, safer place.

December 22, 2019 /Kendrick Umstattd
crypto, Cryptography, cybersecurity, Women in Tech
12 Women of Crypto
Pamela Gupta.jpg

Pamela Gupta (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Pamela Gupta (she/her) founded OutSecure, Inc, in 2000 and serves as its CEO. Every 2.5 hours a company is hacked; Ms. Gupta helps companies stay profitable and achieve resilience by identifying key cybersecurity and privacy risk strategy. She is also a member of Women in CyberSecurity (WiCyS).

1. What’s a piece of advice you’ve found especially useful?

In order to bring about systemic cybersecurity change, you have to understand human psychology. Cybersecurity is more than technology; it’s a mindset that involves changing how we think and function.

2. What’s a challenge you’ve faced, and how did you deal with it?

I am a woman entrepreneur in a male-dominated field. Having grown up and done my undergrad in India, I don’t have a strong support network here, which is critical for establishing a successful business.

I deal with it by working harder and smarter. I bootstrapped my company with self-funding, which made marketing more challenging than it already is. One way to market is to speak at events, but if you’re a vendor, you have to pay large sums of money to attend conferences. I didn’t have the resources to pay for presenting, so I devised a solution: given that my firm creates cybersecurity strategy, my client audience is companies in business management. I researched and found that there were no cybersecurity conferences targeted at business professionals and October is National Cybersecurity Awareness Month; so, I took these as an opportunity to start a business-focused cybersecurity conference.

It cost thousands of dollars to rent space, cater, and arrange speakers, so I had to be creative. I reached out to a local university, and after numerous meetings, I was able to convince them to partner with me and provide the venue and food. I then reached out to my network and arranged a whole-day schedule. It was an intense effort, but we held our first CT’s Annual Business Cybersecurity Summit in 2013. I even got a proclamation from the CT Governor declaring the day of the conference as CT’s Cybersecurity Awareness Day! By being agile, I overcame the hurdle of finding speaking (and marketing) opportunities.

3. What’s your favorite book?

The Paper Bag Christmas by Kevin Alan Milne made me laugh and cry.

December 22, 2019 /Kendrick Umstattd
Cryptography, Crypto, Women in Tech, cybersecurity
12 Women of Crypto
Yansi Keim.jpg

Yansi Keim (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Yansi (she/her) is a Ph.D. student specializing in Cyber Forensics at Purdue University. She researches cybercriminals and profiles their behavior, which helps to understand their deviancy.

Yansi attended her first BlackHat conference this year on scholarship and is also a recipient of the RSA Conference Scholar Class of 2020 and WiCys (Women in Cybersecurity) Scholarship 2020. Yansi is a former technical investigator for the Delhi Police’s Crime Branch and aspires to become a research scientist at Google.

1. What do cybersecurity and crypto mean to you?

As a doctorate candidate in this field, I tend to educate people on the correct meaning of “cybersecurity”: it’s about putting security controls in action against all your IT assets. These assets could range from a printer in a high school to a supercomputer at an enterprise facility. “Crypto” (cryptography) is about encrypting your digital information so that only the desired person can decrypt it. In layman’s terms, it’s making your information gibberish to everyone but the intended receiver.

The myth that “I never did bad to anyone, hence nothing bad will happen to me” should be the starting point to cybersecurity. As a research assistant, I’ve seen elderly people get scammed and children receive disturbing emails containing pornography. My intention is not to incur dread, but awareness: no age group is secure if unaware of the most basic cyber hygiene. Start today and uninstall unnecessary apps from your mobile phone. Put a webcam cover on your computer. Never use public computers for making an online transaction.

2. If you could wave a magic wand and solve one problem in tech, what would it be?

To all the Santa minions at work, please arrange an 11"-long holly phoenix feather core. Once I possess that, I’d like to take on all the pending cybercrime cases in the world. It’s ironic how we secure ourselves with anonymity on the Internet, and at the same time, people use it to commit cybercrime. With all these cyber offenders at large, researchers work hard to come up with better digital forensic methodologies, procedures, and tools — which in turn takes months, even years, to implement.

3. What’s a piece of advice you’ve found especially useful?

My uncle Ajay Mishra once told me, “Wasting time is a crime and so is thinking low. Think wisely, choose the best.” He made me realize it’s not an option to be mediocre in this world; one must always strive to be the best version of themself.

4. What’s a challenge you’ve faced, and how did you deal with it?

Coming from a lineage where no one ever stepped outside my home country, the cultural changes of moving to the US have been the biggest challenges in my life so far. I applied to Purdue, got a scholarship, now here I am among some of the brightest minds of all time.

5. What‘s your source of inspiration?

My family, without a doubt. The fact that they never stopped believing in me makes me feel very special. I believe with family by your side, your motivation doubles, and your strength triples. I want to be a big person for them, if not for myself. Besides them, I am inspired by Alan Turing and Vint Cerf.

6. What’s your favorite movie?

My all-time favorites are The Imitation Game, The Matrix, The Theory of Everything, Inception, and A Beautiful Mind.

Yansi is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
crypto, cryptography, Women in Tech, cybersecurity
12 Women of Crypto
Kristen Beneduce.jpg

Kristen Beneduce (she/her)

December 22, 2019 by Kendrick Umstattd in 12 Women of Crypto

Kristen (she/her) is a Security Researcher and Incident Responder at Sandia National Labs, where she builds future-focused cyber technologies for national defense and hunts threats on critical networks. She transitioned to cybersecurity with a background in contemporary art and business. Kristen is also the founder and Vice President of the Women in Cybersecurity (WiCyS) Silicon Valley Affiliate, a regional community dedicated to elevating women and diversity advocates in Northern California.

1. What does cybersecurity mean to you?

I was 12 when I discovered Windows Temporary Internet files, one of many digital artifacts that can be used to retrace a user’s browsing activity. I can distinctly remember the thrill of the hunt, and my determination to recover what I was looking for.

In college, I studied the social impact of hacking, including artists who hack technology as part of their creative process and the lure of the “Love Letter” email worm that infected 10 million computers in May of 2000. I learned that cybersecurity underpins many civil liberties and has enormous cultural and economic influence.

Today, working in the federal space, I see cybersecurity at the center of National Security. Our nation’s prosperity depends on it. My daily reality is comprised of threats that impact our nation’s future. I deal with it by constantly researching new attack techniques and designing scaleable systems to defend against them.

“My daily reality is comprised of threats that impact our nation’s future.”

2. If you could wave a magic wand and solve one problem in tech, what would it be?

Our nation would be a lot more secure if we solved diversity retention in cybersecurity. Many studies have shown that diverse and inclusive teams are more productive and that diversity and inclusion are especially critical in cybersecurity, where teams need to be at the top of their game to stay ahead of evolving threats. With millions of unfilled cybersecurity jobs around the world, the industry needs to support underrepresented groups. Everyone can be empowered to be a part of security solutions. Security leaders who are full of empathy will help us get there.

3. What’s a piece of advice that you‘ve found especially useful?

“Find good mentors.”

I had the fortune of having several great mentors before my career in cybersecurity. But in my first security role, when I looked around and up the chain, there were few people like me with a nontraditional background. I had questions!

I started getting involved with organizations like Women in Cybersecurity, and as I reached outside my immediate circle, I felt overwhelmed finding other women, albeit the statistical minority, who are also passionate about changing the ratio.

Being in cybersecurity has also broadened my definition of mentorship. It’s normal to feel like you only know 10% of everything you should know, but the beautiful thing is that everyone only knows 10% of the pie and it’s different from your slice. So, peers can also be mentors when it comes to breaking into a new cybersecurity domain.

4. What’s a challenge you’ve faced, and how did you deal with it?

I met my share of naysaying from colleagues and family when I told them I was leaving my corporate role to pursue a masters in Computer Science and Cybersecurity at a small defense academy without any formal technical background.

I understood their concerns. I was on a solid path in the business world. My peers were moving on to prestigious positions at Fortune 100 companies, or founding their own. With an emphatically liberal arts vitae, I was not what they envisioned when it came to cybersecurity.

I gave thorough pause to their concerns, and I took inventory of my values. Cybersecurity deeply aligned with my desire to help others. Plus, I loved that it would challenge my comfort zone and I could constantly be working on ‘the next thing’. So, I leveraged my strengths in research, analysis, and creativity and charted ways to formalize my self-learned technical skills. Despite the naysaying, I would not even call the decision to pursue cybersecurity a calculated risk. It was a win-win!

5. What’s your source of inspiration?

Technology-based artists. Designers. TED talks. Nature. Fierce women!

6. What’s your favorite book?

Code Girls: The Untold Story of the American Women Code Breakers of World War II by Liza Mundy

The Code Book by Simon Singh

Free Culture by Lawrence Lessig

The Nature of Code by Daniel Shiffman

Weapons of Math Destruction by Cathy O’Neil

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Andrew Honig and Michael Sikorski

The Tao of Network Security Monitoring by Richard Bejtlich

Kristen is a Women in CyberSecurity (WiCyS) member.

December 22, 2019 /Kendrick Umstattd
Crypto, cybersecurity, Women in Tech, Cryptography
12 Women of Crypto

Powered by Squarespace