The Executive Women’s Forum announces the 2019 Finalists for the Women of Influence Awards
Executive Women’s Forum on Information Security, Risk Management, and Privacy – The annual Women of Influence Awards recognize four women for their accomplishments and leadership roles in the fields of Information Security, Risk Management, and Privacy. Finalists were selected by a panel of judges from nominations submitted by the nominee’s peers.
Securing the 2020 Elections From Multifarious Threats
SecurityWeek – The vote itself is delivered through electronic voting systems. These machines and their software tend to be old, unpatched, and easily hacked. The actual threat from hacked voting machines is, however, difficult to quantify.
Improved Systems Design Through OTA
Embedded Computing Design – Imagine developing an automotive component for a major OEM. You might be making something as complex as an automatic lane-keeping system or something as small as a tire pressure monitor. But one thing that will be in common is that you will have no way to know all the permutations of vehicles and usages of your humble engineering effort.
How do you build a secure startup? Find out at TechCrunch Disrupt SF
TechCrunch – Security is everything — more so than ever in startup land. But with the constant pressures to launch and scale, how do you build a secure startup from the ground up without slowing growth?
Security flaws in Boeing 787 CIS/MS code can be misused by hackers, security researcher says at Black Hat 2019
Security Boulevard – At the Black Hat 2019 security conference in Las Vegas, Ruben Santamarta, an IOActive Principal Security Consultant in his presentation said that there were vulnerabilities in the Boeing 787 Dreamliner’s components, which could be misused by hackers. The security flaws are in the code for a component known as a Crew Information Service/Maintenance System.

