Skip to main content
Featured:
Women in Tech Global Awards 2024 Winners
Membership
Overview
Professional Membership
Founding Membership
Executive Women in Tech (eWIT)
Global Ambassador
Circles
Log in
Toggle menu
Job Fair 2024
Awards 2024
Overview
2023 Winners
2022 Nominations
2023 Nominations
2024 Nominations
2023 Finalists
Nominate
Categories
Jury
Conference 2025
Why Attend
Tracks & Topics
Chief in Tech Summit
Key Tech Summit
Career Growth Summit
Global Impact Summit
Community Partners
Tickets
Sponsor
Schedule
100 Women in Tech
Career & Jobs
Job Search
Companies
Mentoring Program
Post Jobs & Promote
Create Career Profile
Job Post Plans
Events
About
About us
Get Involved
Newsletter Signup
Press Room & Assets
Advisory Board
Contact
Important Resources
Women in Technology Statistics
Women in Tech Mentorship Statistics
Women in Tech Mentoring Guide
Women in Tech Empowerment Guide
Women in Tech and DEIB Calendar
Chief in Tech Book
50+ Interview Questions and Answers
Network Membership
Global Ambassadors
Founding Membership
C-Level Executive Network (EWIT)
Female Founder Fellowship
Members Pledge
Partners
Events
Women in Tech Global Conference 2024
2024 Sponsor Opportunities
Women in Tech Events
Resources
Announcements
Community & Network
Community Articles
Employer Resources
Feature Stories
Guides, Tutorials & Advice
Interviews & Testimonials
Opinion Pieces
Professional Growth
Reviews, Lists and Comparisons
Surveys & Statistics
Trends & Events
Video Library
Women In Tech Resources & Blog
Tags
Cybersecurity
Cybersecurity
Announcements
,
Feature Stories
,
Global Trends and Events News
Women in Tech Global Awards 2024 Winners: Cybersecurity Leader of the Year Award
Posted on
Dec 4, 2024
•
Angelina Buchvarova
Guides, Tutorials & Advice
6 Reasons Why Cybersecurity Needs More Women
Posted on
Oct 15, 2024
•
Jasmin Diaz
Courses, Training & Certifications
,
Reviews, Lists and Comparisons
Top 10 Tech Courses From Leading Universities and Organizations
Posted on
Jul 31, 2024
•
Teodora Novkova
Video Library
Balancing Tech and Wellness, Reigniting Your Soul
Posted on
May 22, 2024
•
Anna Radulovski
Video Library
Scaling large engagements through consistent customer experience
Posted on
Jun 14, 2023
•
WomenTech Team
Video Library
Mitigating the Impact of Anchor Bias in Cyber Security Planning
Posted on
Jun 13, 2023
•
WomenTech Team
Video Library
Defending Critical Infrastructure From Cyberattacks
Posted on
Jun 13, 2023
•
WomenTech Team
Video Library
Taking a Carrot Approach to Cyber Training
Posted on
Jun 12, 2023
•
WomenTech Team
Video Library
The Opportunities of Explainable AI in Healthcare
Posted on
Jun 12, 2023
•
WomenTech Team
Video Library
Digital Privacy and Security Challenges for the Workplace of the Future
Posted on
Jun 12, 2023
•
WomenTech Team
Video Library
The Global Data and Cyber Security Skills Gap: Current Trends and Future Directions
Posted on
Jun 9, 2023
•
WomenTech Team
Video Library
Project Management - The Whys, Hows & What Nots
Posted on
Jun 8, 2023
•
WomenTech Team
Video Library
The What, Why and How of implementing a Zero Trust Security Model
Posted on
Jun 8, 2023
•
WomenTech Team
Video Library
Accelerating the Movement of Diversity and Inclusion in One Datacenter at time
Posted on
Jun 1, 2023
•
WomenTech Team
Video Library
From TechWoman to TechEnbie - the impact of being non-binary in a binary world
Posted on
May 26, 2023
•
WomenTech Team
Video Library
Claire Zacher Working at the IAEA
Posted on
May 25, 2023
•
WomenTech Team
Video Library
Forge Your Future: An FBI Fireside Chat by Tanya Tucker
Posted on
May 23, 2023
•
WomenTech Team
Video Library
Women in Cyber - The Evolving Landscape and the Impact of Diversity in the Workplace by Wendi Whitmore
Posted on
Jul 22, 2022
•
WomenTech Video Team
Video Library
Practical tips for inclusive design in your prototypes and demos by Clare Warburton
Posted on
Jul 21, 2022
•
WomenTech Video Team
Video Library
Digital Protectors of the New Era: Cyber Insurance by Onur Korucu
Posted on
Jul 21, 2022
•
WomenTech Video Team
Video Library
Adversarial attacks and defense mechanisms against deep point processes by Samira Khorshidi
Posted on
Jul 21, 2022
•
WomenTech Video Team
Video Library
Trivia on Technology Trends by Jennifer Glenski
Posted on
Jul 21, 2022
•
WomenTech Video Team
Video Library
Artificial Intelligence and Machine Learning - Contextualizing security risks by Shafia Zubair
Posted on
Jul 21, 2022
•
WomenTech Video Team
Pagination
Current page
1
Page
2
Page
3
Next page
››
Last page
Last »
sfy39587stp18