About
Strategic technical security leader and executive…
Articles by Tarah M.
Activity
-
Get some coffee and sit down with this book by Andrea Bonime-Blanc, JD/PhD. Governing Pandora is every bit as good if not implausibly better than I…
Get some coffee and sit down with this book by Andrea Bonime-Blanc, JD/PhD. Governing Pandora is every bit as good if not implausibly better than I…
Shared by Tarah M. Wheeler
-
We at TPO Group are thrilled to work with Bishop Fox in this partnership to bring the highest quality cybersecurity to organizations that demand…
We at TPO Group are thrilled to work with Bishop Fox in this partnership to bring the highest quality cybersecurity to organizations that demand…
Shared by Tarah M. Wheeler
-
There's no such thing as a cybersecurity industry best practice. There is no Bureau of Cyber Statistics, which there absolutely should be (h/t 😷…
There's no such thing as a cybersecurity industry best practice. There is no Bureau of Cyber Statistics, which there absolutely should be (h/t 😷…
Posted by Tarah M. Wheeler
Experience & Education
Licenses & Certifications
Volunteer Experience
-
RightsCon Co-Chair, Digital Privacy & Encryption
Access Now
- 9 months
Science and Technology
Access Now invites you to RightsCon Toronto 2018, the seventh event in the RightsCon Summit Series. As the world’s leading conference on human rights in the digital age, we bring together business leaders, policy makers, general counsels, government representatives, technologists, and human rights defenders from around the world to tackle pressing issues at the intersection of human rights and digital technology. This is where our community comes together to break down silos, forge…
Access Now invites you to RightsCon Toronto 2018, the seventh event in the RightsCon Summit Series. As the world’s leading conference on human rights in the digital age, we bring together business leaders, policy makers, general counsels, government representatives, technologists, and human rights defenders from around the world to tackle pressing issues at the intersection of human rights and digital technology. This is where our community comes together to break down silos, forge partnerships, and drive large-scale, real-world change toward a more free, open, and connected world.
-
Executive Board Member
Good Faith Cybersecurity Researchers Coalition
- Present 2 years 8 months
Science and Technology
International coalition working to improve the process of reporting vulnerabilities to companies and countries.
Publications
-
Website Security Threats For Dummies
Wiley & Sons
See publicationTechnical editor for Website Security Threats For Dummies.
-
Women in Tech: Take Your Career to the Next Level with Practical Advice and Inspiring Stories
Sasquatch Books
Geared toward women who are considering getting into tech, or those already in a tech job who want to take their career to the next level, this book combines practical career advice and inspiring personal stories from successful female tech professionals Brianna Wu (founder, Giant Spacekat), Angie Chang (founder, Women 2.0), Keren Elazari (TED speaker and cybersecurity expert), Katie Cunningham (Python educator and developer), Miah Johnson (senior systems administrator), Kristin Toth Smith…
Geared toward women who are considering getting into tech, or those already in a tech job who want to take their career to the next level, this book combines practical career advice and inspiring personal stories from successful female tech professionals Brianna Wu (founder, Giant Spacekat), Angie Chang (founder, Women 2.0), Keren Elazari (TED speaker and cybersecurity expert), Katie Cunningham (Python educator and developer), Miah Johnson (senior systems administrator), Kristin Toth Smith (tech executive and inventor), and Kamilah Taylor (mobile and social developer).
Written by a female startup CEO and featuring a host of other successful contributors, this book will help dismantle the unconscious social bias against women in the tech industry. Readers will learn:
· The secrets of salary negotiation
· The best format for tech resumes
· How to ace a tech interview
· The perks of both contracting (W-9) and salaried full-time work
· The secrets of mentorship
· How to start your own company
· And much moreOther authorsSee publication -
Prospect Theory and the Cyprus Conflict: Analyzing Decisionmaking in the Turkish Cypriot President
Portland State University
See publicationRauf R. Denktash, the Turkish Cypriot president and leader of the Turkish Republic of Northern Cyprus, has made many decisions not to negotiate with his Greek Cypriot counterpart for peace and reunification on the island of Cyprus. Traditional rational choice theories do not explain his willingness to sacrifice political power for his policy goals in risky choices. Prospect theory, a cognitive behavioral theory of decisionmaking, may help to explain why Denktash makes those risky choices by…
Rauf R. Denktash, the Turkish Cypriot president and leader of the Turkish Republic of Northern Cyprus, has made many decisions not to negotiate with his Greek Cypriot counterpart for peace and reunification on the island of Cyprus. Traditional rational choice theories do not explain his willingness to sacrifice political power for his policy goals in risky choices. Prospect theory, a cognitive behavioral theory of decisionmaking, may help to explain why Denktash makes those risky choices by showing that decisionmakers who feel themselves to be in the domain of losses will make risky choices to gain their reference point, the location at which they feel themselves to switch from the realm of losses to that of gains.
Denktash’s negotiating style reveals that he feels himself to be in the realm of losses, meaning that under the precepts of prospect theory, he is empirically likely to make risky decisions. The historical overview of Denktash’s negotiations with the Greek Cypriots shows that Denktash continually makes decisions likely to reduce the very power by which he tries to achieve his policy goals.
Honors & Awards
-
SANS NetWars Europe Tournament Of Champions Capture the Flag, 2nd place, First Timers Team Division
SANS Institute
-
US/UK Fulbright Scholar, Cyber Security
The Fulbright Commission
-
SANS NetWars International Tournament Of Champions Capture the Flag, 9th place, Team Division
SANS Institute
9th place in the SANS International Tournament of Champions Capture The Flag, Team Division.
-
DefendCon 2019 Capture The Flag, Champion
DefendCon
Security Innovation (Web Application Pentesting) Capture The Flag, champion
-
SANS NetWars CORE Capture The Flag: 2nd place, Individual Veterans
SANS Institute
The SANS NetWars Experience:
Consists of an interactive, Internet-based environment for computer attacks and analyzing defenses
Is designed to be accessible to a broad level of player skill ranges
Is split into separate levels so players may quickly advance through earlier levels to the level of their expertise.
The entire challenge involves five levels:
NetWars Levels
Level 1 - Played on local Linux image without root
Level 2 - Played on local Linux image with…The SANS NetWars Experience:
Consists of an interactive, Internet-based environment for computer attacks and analyzing defenses
Is designed to be accessible to a broad level of player skill ranges
Is split into separate levels so players may quickly advance through earlier levels to the level of their expertise.
The entire challenge involves five levels:
NetWars Levels
Level 1 - Played on local Linux image without root
Level 2 - Played on local Linux image with root
Level 3 - Attack a DMZ
Level 4 - Pivot to intranet
Level 5 - Master of your domain... castle versus castle -
Leaders In Cybersecurity
New York University
Inspiring leadership in cybersecurity
-
2017 Top Women In Cybersecurity
CyberScoop
In honor of Women’s History Month, we present our inaugural Top Women in Cybersecurity list, filled with individuals who are upending the status quo. This list contains a group of minds who are not just knee-deep in code, but are making the business and legal decisions that will push cybersecurity forward in both the public and private sector.
-
National Science Foundation Fellow, IGERT-IDEAS
National Science Foundation
The Integrative Graduate Education and Research Traineeship (IGERT) program has been developed to meet the challenges of educating U.S. Ph.D. scientists and engineers with interdisciplinary backgrounds, deep knowledge in chosen disciplines, and technical, professional, and personal skills. The program is intended to establish new models for graduate education and training in a fertile environment for collaborative research that transcends traditional disciplinary boundaries. It is also…
The Integrative Graduate Education and Research Traineeship (IGERT) program has been developed to meet the challenges of educating U.S. Ph.D. scientists and engineers with interdisciplinary backgrounds, deep knowledge in chosen disciplines, and technical, professional, and personal skills. The program is intended to establish new models for graduate education and training in a fertile environment for collaborative research that transcends traditional disciplinary boundaries. It is also intended to facilitate diversity in student participation and preparation, and to contribute to a world-class, broadly inclusive, and globally engaged science and engineering workforce.
Organizations
-
Organization for Economic Cooperation And Development
Cybersecurity Expert Advisor
- PresentI provide expert policy feedback and working group participation at the OECD. See my Hewlett Cyber Initiative grant and New America initiatives on capacity building.
Recommendations received
7 people have recommended Tarah M.
Join now to viewMore activity by Tarah M.
-
If you, like me, enjoy sheer Gothic terror and early feminists wondering why we still have to protest this ****, maybe you'd like the two audiobooks…
If you, like me, enjoy sheer Gothic terror and early feminists wondering why we still have to protest this ****, maybe you'd like the two audiobooks…
Shared by Tarah M. Wheeler
Other similar profiles
-
Graydon McKee - MSIA, CISSP
Graydon McKee - MSIA, CISSP
My personal/professional website: http://www.graydonmckee.com <br> <br>► BRIEFLY: I help SMB and enterprise-level companies protect shareholder value, market share, revenue and brand reputation through the protection sensitive information and assets. I establish information security programs which constantly assess the security posture of the network environment / security architecture and introduce a diverse portfolio of viable, context specific information security solutions to protect company assets, revenue, and liquidity. I believe an integrated blended approach to information security improves a company’s competitive edge and promotes agility in a dynamic marketplace.<br><br>► SKILLS: I’m skilled in Leadership, strategic thinking, information security, compliance, controls, policy, business technology, IT Security among others. I have held positions as both an internal resource as well as a consultant. Over the years in my roles as a consultant, I have seen and analyzed many different IT environments. I have learned what solutions work (and why) and what do not (and why). I have managed globally diverse teams of 10 or more individuals. I am an effective communicator able to adjust my message for my audience be they technical, business oriented, or executive level. I’m adept at managing diverse relationships and inspiring others. I enjoy collaborative environments and facilitating joint solutions to complex problems. <br><br>► EXPERIENCE: I started my career as a technical resource providing network administration and end user support before moving into management consulting in information security. Over the years I’ve developed an expertise in addressing the protection of information and intellectual property in the following industries: Consumer Electronics, Printing and Packaging, Consulting, Overseas Manufacturing, Software Development and Distribution, Financial Sector, Educational Institutions, and the Public Sector. I’ve experience addressing audit and compliance to many information security guidelines such as (but not limited to) GDPR, CCPA, SOX, PCI DSS, GLBA, FISMA, C-TPAT, HIPAA and numerous international data protection and privacy laws. <br><br><br>
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content