Remove Energy Remove Security Remove Technical Advisors Remove Training
article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 131
article thumbnail

Secured by Women: Meet Rinki Sethi, VP and CISO at BILL

Lacework

Women’s representation in cybersecurity has come a long way in the last decade, but we still have progress to make before the balance truly shifts. That’s exactly why Lacework launched Secured by Women last year; and now, we’re thrilled to be back to continue championing the incredible women making a difference in cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Rethinking the IT talent pipeline

CIO

Amanda Merola had zero technical background when she came to The Hartford in 2015, despite a natural interest in computers and a proclivity for problem-solving. Merola was accepted into the HartCode Academy’s inaugural class, spending months in bootcamps and self-directed training before landing a position as a junior coder.

article thumbnail

Price Forecasting: Applying Machine Learning Approaches to Electricity, Flights, Hotels, Real Estate, and Stock Pricing

Altexsoft

Commodity traders, investors, construction developers, or energy generators use estimates on future price movements for business purposes. To solve the price prediction problem, data scientists first must understand what data to use to train machine learning models, and that’s exactly why descriptive analytics is needed.

article thumbnail

Mobiconf 2019: Our Experience

Apiumhub

A long journey that included some severe injuries born from the intense training, but that proved successful once she managed to achieve her goal, to be a part of a circus tour. This was a pretty technical talk. At night we were invited to private party for the attendees, where we could have more informal talks and networking chances.

article thumbnail

New sexual-assault allegations against ‘phone phreaker’ John Draper

The Parallax

How the myth of meritocracy stymies women in cybersecurity. Facebook, EFF security experts sound off on protecting the vulnerable. He invited in Jay, who was still hoping to discuss technical topics in-depth. ”—Leigh Honeywell, adviser, Ada Initiative. READ MORE ON TRENDS IN HACKER CULTURE.