Your cyber intelligence source

Women of influence: 30 top cybersecurity leaders 2021

Women of influence: 30 top cybersecurity leaders 2021

SC Media UK's pick of the most influential women in cybersecurity through the pandemic. 

By Kathryn Cave


“My grandmother,” wrote American author Amy Tan. “She's someone I never met, and I would've loved to have met her. She's been a huge influence on our entire family, not just me. She is a mystery.” 

Influence is a strange and deceptive force. It can be tangible or intangible. Obvious or subtle. It can mean big, public things that touch the lives of everyone, or quieter, smaller things that have a lasting impact. 

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image
share