Your cyber intelligence source

EUROPE LIST: 50 Women of Influence in Cyber-security Europe 2019

EUROPE LIST: 50 Women of Influence in Cyber-security Europe 2019

In cooperation with Bonnie Butlin of WISECRA, SC Media UK is delighted to announce the 50 leading European* Women in Cyber-security for 2019. *Excludes UK which has a separate list, link below.

On behalf of SC Magazine UK, it is my pleasure to announce the Top 50 European Women in Cyber-security for 2019. As executive director of the Security Partners’ Forum and international coordinator of the Women in Security & Resilience Alliance (WISECRA), I believe that recognising the accomplishments and successes of women in security -- both locally and globally -- is essential to supporting, facilitating, and building capacity within security, both for women and for the security profession as a whole.

In creating this year’s Top 50 list, we evaluated each individual across a variety of vectors, such as conferences spoken at, articles and books published, evidence of demonstrated cyber-security expertise, current and previous positions, prominence within open sources and social media activity, such as LinkedIn feed, tweets and posts, and additional information obtained through informal discussion and engagement with international communities and professional networks and colleagues. 

I would also like to thank Luigi Rebuffi, secretary general of the European Cyber Security Organisation (ECSO), for his assistance in terms of insights and recommendations for this list. 

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image
share