• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

Women in Information Security: Alana Staszczyszyn

Last time, I had the privilege of speaking with web security specialist Pam Armstrong.

This time I got to chat with Alana Staszczyszyn, someone whom I’ve had the pleasure of meeting in person. She’s very active in Toronto’s cybersecurity scene. She’s currently a student, but she has so much to teach people in our industry about evolving cyber threats and the red team mindset. Considering her role as an information security thought leader already, imagine the impact she’ll have on the industry once she graduates!

Kim Crawley: Please tell me a bit about what you do.

Alana Staszczyszyn: As of right now, I am mainly focusing on offensive security consulting – penetration testing, particularly. I am also in the midst of finishing my degree in infosec and I am involved in some initiatives that target infosec education.

KC: That’s awesome. Where are you studying, and what does your academic program entail?

AS: I am studying at Sheridan College in its Information Systems Security degree program. The program consists of a wide variety of information security topics from more computer science-based mathematical and theoretical topics to applied technical topics. The technical courses later in the program dive into specific infosec topics, such as forensics, malware analysis, secure software development, penetration testing, and more. There are also courses that cover the business aspects and strategic principles of infosec. When I entered the industry, I found those to be some of the most valuable ideas I had yet come across.

There are also some courses that focus on the connection between infosec/technology and the world, such as ethics or viewing trends in the industry. Personally, I find those to be some of the most interesting classes. I’m a huge nerd for intersecting concepts, such as sociology, (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/off-topic/women-in-information-security-alana-staszczyszyn/

Tags: cyber threatInformation SecurityOff Topicwomen
2 years ago
Tripwire Guest Authors

Related Post

  • A Natural Law for Digital Data

    Digital data provides the strength and vitality of the Information Age. Bits have as much,…

  • Microsoft Sued for LinkedIn Clipboard Snooping Scare

    LinkedIn got caught reading personal data from iPhone clipboards. Now a user is suing Microsoft’s social…

  • Setting Up an ISO 27001-Compliant Remote Work Process

    With the spread of more robust information and communication technologies, the possibility of remote work…

Recent Posts

  • Cybersecurity
  • Data Security
  • Featured
  • Incident Response
  • Network Security
  • News
  • Security Boulevard (Original)
  • Spotlight
  • Threats & Breaches

EU Vaccine Regulator Hacked for Pfizer/BioNTech Info

The European Medicines Agency (EMA) says it was hacked by persons unknown.

13 mins ago
  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

1 hour ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

3 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

3 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

4 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t