Courses by Caroline
Articles by Caroline
Activity
-
The SF <> Seattle Bsides Security Conference caravan landed! Cliff Crosland Maya Kaczorowski Coleen C.
The SF <> Seattle Bsides Security Conference caravan landed! Cliff Crosland Maya Kaczorowski Coleen C.
Liked by Caroline Wong
-
It's been quite a week! 😅 🍻 AI Portland's first happy hour of the year at Migration Brewing kept filling up (pun intended) -- the longer it went,…
It's been quite a week! 😅 🍻 AI Portland's first happy hour of the year at Migration Brewing kept filling up (pun intended) -- the longer it went,…
Liked by Caroline Wong
-
Couldn't be more excited to welcome Kierra Dotson to the Further team as an AI Strategist. I was so impressed by her stage presence and credibility…
Couldn't be more excited to welcome Kierra Dotson to the Further team as an AI Strategist. I was so impressed by her stage presence and credibility…
Liked by Caroline Wong
Publications
-
Artificial Intelligence and Application Security
LinkedIn Learning
See publicationArtificial intelligence is changing application security in three significant and exciting ways: how hackers conduct attacks, how application security professionals operate daily, and how the software and learning models supporting artificial intelligence are also targets for hacking.
In this course, Caroline Wong describes each of these aspects to help you understand how to differentiate between the different use cases, as well as identify how each applies to your specific…Artificial intelligence is changing application security in three significant and exciting ways: how hackers conduct attacks, how application security professionals operate daily, and how the software and learning models supporting artificial intelligence are also targets for hacking.
In this course, Caroline Wong describes each of these aspects to help you understand how to differentiate between the different use cases, as well as identify how each applies to your specific organization. Caroline also shares key takeaways and practical actions that you can use in your daily lives as you personally interact with AI and applications. -
Learning the OWASP Top 10
LinkedIn Learning
See publicationIn this course, application security expert Caroline Wong provides an overview of the 2021 OWASP Top 10, presenting information about each vulnerability category, its prevalence, and its impact. Though aimed at IT security professionals and developers, anyone who uses web applications will benefit from an understanding of these risks.
-
Leveraging Security Metrics in Your Organization
LinkedIn Learning
See publicationI like to refer to this course as "How to Ask for Security Budget... and Get It!"
-
Cybersecurity at Work
LinkedIn Learning
See publicationLearn about the most common cybersecurity threats that affect our modern lives.
Please enjoy and share with your friends and colleagues! This one is also great for family, especially if you find yourself in the position of "IT helpdesk" all the time. -
Humans of InfoSec Podcast
See publicationHumans of InfoSec is a show about real people, their work, and its impact on the information security industry.
-
Security Metrics: A Beginner's Guide
McGraw-Hill
See publicationSecurity Metrics: A Beginner's Guide has been inducted into the Cybersecurity Canon Hall of Fame (2022).
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program.
This practical resource covers project management…Security Metrics: A Beginner's Guide has been inducted into the Cybersecurity Canon Hall of Fame (2022).
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program.
This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Honors & Awards
-
IT Security Power Player
SC Media
-
Cybersecurity Educator of the Year
Women's Society of Cyberjutsu
-
Top 10 Women in Cloud
CloudNOW
-
IT Security Influencer
SC Media
-
"One-to-Watch" Women of Influence Award
Executive Women's Forum
Organizations
-
N2K Cyberwire Hash Table
Cybersecurity Subject Matter Expert
- PresentWe’ve gathered together an influential group of experienced cybersecurity experts that have agreed to sit around the table with us, share their experiences, and lend their perspectives to our programs. We call this table the Hash Table. https://thecyberwire.com/podcasts/career-notes/166/notes https://thecyberwire.com/pages/hashtable.html
-
SensCy, GirlsCanHack, Portal26, Whistic, RSA Conference
Board Member (Advisory)
- PresentI'm passionate about contributing to the cybersecurity industry and providing my advice to impactful organizations. - SensCy: 2023 to Present - GirlsCanHack: 2023 to Present - Spark Mindset: 2020 to 2023 - RSA Conference: 2018 to 2023 - Portal26: 2020 to 2023 - Whistic: 2018 to 2023
-
Forte Group
Board Member
-I was a founding member (Treasurer) of the Board for the Forte Group.
-
Chief
Member
-Chief is a private women's business networking organization for senior executives.
Recommendations received
34 people have recommended Caroline
Join now to viewMore activity by Caroline
-
65% say they’re using AI agents. Average workflow automation sits at 31%. Only 10% have automated more than half their processes. The gap isn’t…
65% say they’re using AI agents. Average workflow automation sits at 31%. Only 10% have automated more than half their processes. The gap isn’t…
Shared by Caroline Wong
-
Pre-order your copy now! THE AI CYBERSECURITY HANDBOOK (Wiley, 2026): https://a.co/d/02h73rUz Caroline Wong, chief strategy officer at Axari, said…
Pre-order your copy now! THE AI CYBERSECURITY HANDBOOK (Wiley, 2026): https://a.co/d/02h73rUz Caroline Wong, chief strategy officer at Axari, said…
Shared by Caroline Wong
-
This is a major step forward in what automated remediation can be, and one I've actually seen working in my own environment - if you've actually…
This is a major step forward in what automated remediation can be, and one I've actually seen working in my own environment - if you've actually…
Liked by Caroline Wong
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Caroline Wong
987 others named Caroline Wong are on LinkedIn
See others named Caroline Wong