Zoe Braiterman
Sep 9, 2018 · 1 min read

Building Fault Tolerant Human Capital Systems

We must collaboratively drive a workforce, adaptive to a dynamic cyber threat landscape. It is therefore critical (pun intended) to integrate unique contributions from various dedicated individuals.

  1. Multi-Stakeholder Representation, Communication & Responsibility: When it comes to Internet security, we are ALL stakeholders!
  2. Unseen Solutions (and Solvers) to Unseen Threats: If we could predict every breech, we’d easily cut organizational costs… To outsmart adversaries, we must embrace novel approaches and collaborate early and often. Our extra commitment volunteer training and mentorship time commitment satisfies us and secures many.
  3. Time is Valuable and Limited: Adversarial incentives (economic, political, etc.) by far exceed the scope of individual disputes… Persistent threats stem from extensive, international efforts of malicious hacker organizations await TIME for neither research grants nor personal reputation building.

… So who do WE want on teams set to secure OUR Internet?

  1. The Communicator (Jane Frankland): http://jane-frankland.com
  2. The Strategist (Magda Chelly): https://responsible-cyber.com/
  3. The Unifiers (Grant Lecky and Bonnie Butlin):

4. The Venturer (Chenxi Wang): https://globenewswire.com/news-release/2018/06/26/1529410/0/en/Female-Cybersecurity-Veteran-Chenxi-Wang-Breaks-Industry-Barriers-with-Launch-of-Venture-Capital-Firm-Rain-Capital.html

5. The Team Captain (Mariah Kenny): https://www.usnews.com/news/stem-solutions/articles/2018-07-16/commentary-a-female-network-will-deter-cybersecurity-threats

Zoe Braiterman

Written by

Innovation Intelligence Strategist (Machine and Human), Data Scientist, Independent Researcher, OWASP Women in AppSec Committee Chair