The Top 10 Women Cyber Guardians You Should Know About

ra2studio/Shutterstock.com

Here is an unempirical roundup of 10 influential leaders in information security, who happen to be women.

The paucity of women in math and science extends to the data security realm. Women make up 14 percent of federal government cyber personnel, according to a May (ISC)2 global information security workforce study. The number was even lower in the private sector as recently as 2013: 11 percent.

But quantity does not equal quality.

And there is top-notch talent gracing the field across government, academia and industry. Here is an unempirical roundup of 10 influential leaders in information security, who happen to be women.

Ann Barron-DiCamillo, director, Department of Homeland Security, U.S. Computer Emergency Readiness Team

Susan Walsh/AP

Oversees a round-the-clock watch center that collects, processes and shares information on cyberthreats with agencies and industry sectors. The disclosure of a theft of Office of Personnel Management files on 21.5 million national security-sensitive personnel and their families thrust her into the national spotlight -- a position she was uncomfortable with as an evangelist of confidentiality. Testifying at a House hearing in June on U.S. CERT's role in the response, she acknowledged, "Like many Americans, I too am a victim of these incidents . . . Although I am appearing today ready to provide information to this committee, I do so with some concern" about losing the trust of victims who open up to U.S. CERT. Her organization relies on voluntary cooperation from agencies and firms who believe they might have been hacked. "I worry that U.S. CERT appearing before this committee will have a chilling effect on their willingness to notify us," she said. "We especially need private companies to continue to work with government and to share information about cyberthreats and incidents so that through greater shared awareness we can all be more secure from those who to seek to do us harm."  

Sally Holcomb, Deputy Chief Information Officer, National Security Agency/Central Security Service

National Security Agency

Tasked with protecting information systems that hold, perhaps, the world's most secret data. "You may have heard we had some leaking problems," she said in April, referring to ex-NSA contractor Edward Snowden's spilling of classified intelligence. Increasingly, the agency depends on the cloud for tighter security and, paradoxically, easier access. Metadata makes both possible, she said. Each piece of information is tagged with details on content and who can read it. "Having the ability to secure at the object layer is pretty exciting for us," she said at a cybersecurity summit organized by the Armed Forces Communications and Electronics Association. At the same time, NSA must also ensure the intelligence remains discoverable. A search "query has to result in 'Hey, you may or may not have authorization, but there is data here subject to your request' and then give a means for someone to go find it.”

Patricia Larsen, co-director of the National Insider Threat Task Force, Director of National Intelligence

Office of the Director of National Intelligence

Manages a growing team of leak-pluggers across government. Her mission is to guard government secrets and government staff from those who can't be trusted. "It’s a privilege to work in that program," she said last December at a forum hosted by Nextgov. "And the only reason that you are there is to help protect your colleagues, not to out them. So, we’ve got to professionalize that workforce of people who do this for a living. They have to view themselves as part of a community.” The specialists must undergo training on privacy protections, intelligence oversight and investigative procedures, should their suspicions bear truth. "It is also critical to remember the human element, and the expertise of clinical psychologists is crucial to inform insider threat analysis,” she said.

Catherine Lotrionte, director of the Cyber Project, Georgetown University

C-SPAN

Leads a research initiative that explores the role of international and domestic laws in fighting cyber threats. Last fall, she illuminated one way the United States might be able to use the World Trade Organization to punish China for economic espionage. A provision in the 1995 Trade Related Aspects of Intellectual Property Rights Agreement deals with a country's obligation to protect undisclosed information. The clause "obliges each WTO member within its own jurisdiction -- to protect foreign companies' [undisclosed information], as they would protect their own companies' undisclosed information," she said. The snag is that cyberspace spans jurisdictions. But she pointed out a potential workaround. It is very possible the Chinese ultimately will file a cyberspying case against America with the WTO, she said. When that happens, the United States’ best move would be to “argue a defensive legal argument under our rights to counter what they are doing," she said. "That would force the panel at the WTO to bring clarity to what those obligations mean for protecting undisclosed information."

Angela McKay, director of cybersecurity policy and strategy, Microsoft

Microsoft

Coordinates with the private sector, customers and law enforcement to build confidence in each other and in the Web. "One of the things that as an industry we're really trying to grapple with is what should we be doing on behalf of users -- like automatic updates -- and what are the things that we want to inform users [of] to make good risk decisions” on their own, she said at a February cybersecurity symposium organized by New America. "That's something where the pendulum hasn't found a good equilibrium point." The software giant once was reluctant to push out automatic updates, "because there was some concern that Microsoft was being the big top-down antitrust” entity, she said, "but as we realized the security ecosystem was changing we realized we needed to help users in this space."

Katie Moussouris, chief policy officer, HackerOne

HackerOne

Widely recognized for founding Microsoft's "bug bounty" program that awards researchers with cash for reporting security holes they discover in the Seattle firm's software. Now at HackerOne, a San-Francisco-based company that organizes similar prize programs, she criticizes policies that treat bug-finders like criminals. A new presidential order authorizing sanctions against people complicit in exploiting software glitches could discourage analysts from warning about such vulnerabilities, she said. The policy's language should be tightened "to really reflect the intent, as opposed to increasing that fear among the security research community," she said during an interview. Even if not sanctioned, "there are several other pressures that researchers will face where their jobs are contacted, their careers are threatened, and all kinds of other things that are non-criminal prosecution but more like persecution." She rails against a current U.S. proposal to carry out an international arms agreement called the Wassenaar Arrangement that would control the international export of intrusion software. "The same offense techniques that are developed to bypass existing computer security measures are used in research to highlight weaknesses in order to fix the vulnerable software," she wrote in Wired last week. For spies, "no regulation will stop them. It is our job to collectively ensure that no regulation stops defenders."

Melinda Rogers, chief information security officer, Justice Department

Justice Department

Keeps information technology systems safe across the federal justice system. Her advice for organizations interested in surviving after a hack? “At the end of the day -- it’s knowing what is in your environment. It’s very easy to say, 'Oh, well it's an email system,' with email inside . . . but, that’s not the right answer," she said at an AFCEA symposium last December. "One most own [the data, by] knowing what’s in the data and then take proper precautions." Justice is updating acquisition guidance to make sure civil service employees understand that, when they work with vendors, encryption, contractor background investigations and other security controls must be carried out. When the inevitable data breach happens, damage control will hinge on "knowing what you have," she said.

Phyllis Schneck, DHS deputy undersecretary for cybersecurity and communications.

Manuel Balce Ceneta/AP

Sees to it that Homeland Security serves as a "focal point for the security of cyberspace," per presidential directive. The cyber czar of DHS previously made a name for herself as McAfee's chief technology officer and chairman of the National Board of Directors of the FBI’s public-private InfraGard cybercrime program. Now, she works with critical sectors, like the power industry, to protect machines that increasingly are becoming accessible from the public Internet. Critical infrastructure systems are among the things in the so-called Internet of Things. These are the devices, in addition “to our refrigerators and toasters, that are connected," she said. Her “personnel are engaging cleared asset owners, the folks running and operating the water plants, the electric plants, the transportation to look through a classified briefing campaign and address the impacts of recent BlackEnergy” spyware that targets industrial control systems, she said at a May 6 meeting of the President’s National Security Telecommunications Advisory Committee.

Suzanne Spaulding, DHS undersecretary for the National Protection and Programs Directorate

Homeland Security Department

Runs the DHS division tasked with defending U.S. infrastructure against cyber- and physical threats. Once a regular on Capitol Hill who worked for both Democrats and Republicans for over a quarter of a century, she is more concerned about nonpartisan matters these days. "I really do worry that in the next year or so will be the year of the destructive attacks," Spaulding said April 27, during an event organized by New York's Fordham Law School. "With the Sony incident, all of the attention was on the salacious emails and the theft of movies before they came out and far less attention was paid -- for reasons I'm not clear on -- on the destructive nature of that attack: that there was destructive malware deployed that destroyed computers and data irretrievably." She expects, no, she will put an end to further U.S. network sabotage. "Hope is not a plan. We have other plans," she said.

Up and comer: Shannon Praylow, senior officer, an intelligence community 24-hour watch center

Patrick Semansky/AP

Manages a team at an undisclosed government facility in the Washington area. The 34-year-old contractor for Maverick Cyber Defense has no college degree and had to work her way up, while training and attending boot camp in the Virginia Army National Guard. Now, the departments of Defense, Homeland Security, Justice and State are all on her resume, sometimes concurrently. Yet, the shards of the broken glass ceiling cut deep. "Right now I’m a team lead of 10 males," some of whom are upward of 45 years old, she said. "I deal a lot with name calling, talking behind my back. And I can’t let that bother me." A National Guard recruiter in 2001 first wanted to try her out as a truck driver: "I said, ‘No,’ turned around and walked out. Walked in a few months later, and he said, 'We do have this computer section, would you be interested?’”

(Image via ra2studio/ Shutterstock.com)

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.