Military Transition Panel

Presented at ShellCon 2019, Oct. 12, 2019, 10:30 a.m. (50 minutes)

Veterans representing multiple branches of military service and a wide breadth of personal experience share their stories and advice about transitioning to careers in Information Security.

Moderated by: Malia Mason


Presenters:

  • Lisa Jiggets
    Lisa Jiggetts is the Founder and President of the Women's Society of Cyberjutsu (WSC), one of the fastest growing nonprofits dedicated to women in cybersecurity.  WSC provides women with the resources and support required to enter and advance as a cybersecurity professional. Her organization uses a holistic approach to develop programs that train women in both the hard technical skills and soft skills, leaving them feeling empowered to succeed. She is most proud to be known as a straight-up but down-to-earth motivator with the women whom she mentors. Lisa and her organization have been profiled in Fortune Magazine, SC Magazine, and Pentest Magazine among others.  She is a sought after presenter and has been a guest speaker for numerous conferences and recorded podcasts. Lisa, a service-disabled veteran, began her cyber career in the military where she excelled as an IT security specialist.  With 20+ years of Information Technology experience, 19 of which are in cybersecurity, her experience spans risk assessments, penetration testing, vulnerability assessments and policy development across military, government and commercial industries. She holds a variety of technical and management certifications as well as a Bachelor's degree in Information Technology from the University of Maryland University College and an MBA. Not just a full time geek with a passion for making a difference, Lisa is also an accomplished artist.
  • Aaron Binkowski
    Aaron Binkowski is a seasoned veteran in the tech industry, a former tech company owner, and Force Reconnaissance Marine veteran; leveraging his past experiences in cybersecurity and the military, he is energetically taking his ‘results-based' approach to world of Governance, Risk, and Compliance. He currently operates as the Global Information Security Manager of GRC and works alongside Akyl Phillips.
  • Akyl Phillips
    Currently a senior security engineer at HireRight. I engineer SIEM Solutions that ingest logs and data from various security technologies and operate as both forensics researcher/incident responder during security incidents. I've served  9 years in the U.S Marine Corps. I've had the fortune to develop skills in multiple fields such as Linux system administrator, Network Administrator, and Cybersecurity Specialist.
  • Jawana R. McFadden
    Jawana McFadden is a proud member of the United States Army, with this year marking her 21st year of service. She has been involved in the practice of Diversity and Inclusion within the Human Resources umbrella for the same amount of time. Fusing her military and civilian skills, she has been a consultant and advocate on the eradication of employment bias for veterans and individuals with disabilities. She is currently the program manager for Veterans and Individuals with Disabilities at Southern California Edison and a First Lieutenant in the Army National Guard.
  • Malia Mason
    Malia is an experienced cyber security engineer and the recent co-founder and CEO of Integrum, a cyber security consulting firm focusing on security compliance for small businesses and non-profit organizations. She is also the current president and co-founder of the Women in Cybersecurity (WiCyS) SoCal Affiliate. Malia served on active duty in the Navy for 4 years where she was a lead computer technician. She is an active member of ISSA, ISACA, OWASP, IAPP, WiCyS, Women's Society of Cyberjutsu and was just named Chair of the Technology Committee for AnitaB.org. A champion for women, veterans, and minorities in technology, she serves on the advisory board for Long Beach City College and mentors students in various community colleges around Los Angeles. She has mentored girls in middle school and high school at several cybersecurity camps and events.

Links:

Similar Presentations: