top of page

WEBSITE SEARCH 

75 items found for ""

  • DONATE | BlacksInCyber

    DONATE Blacks In Cybersecurity Headquarters, Inc. is a 501(c)(3) Non-Profit Organization. ​ Click b elow to donate. For questions, comments and concerns please inquire here.

  • SPEAKER DEVELOPMENT PROGRAM | BlacksInCyber

    SPEAKER DEVELOPMENT PROGRAM The Speaker Development Program Application is located h ere. ​ The Speaker Development Program (SDP) will... ​ The program outline will consist of challenges, tasks , small projects, panels, seminars and talks to prepare the candidates for public speaking in the Cybersecurity space and qualify them for graduation from the program. The program will consist of lessons, benchmarks and feedback from the collective program committee as well as the assigned mentor of the candidate. Program Mission Statement: In this initiative, Blacks In Cybersecurity seeks to bring more Black participants to contribute to, experience and give back to the Cybersecurity community by preparing them with knowledge and skills. ​ ​ Session length: 6 sessions of 90 minutes each. Objectives and Tasks: Discuss why give talks and where to give talks. Discuss purpose of talks Discuss the goals of each participant. Have cohort leaders talk about their journey giving talks. Set expectations and goals for cohort. Discuss picking a topic, all the different topics out there, researching your subject (which will be different for every type of topic and will be different depending on the length of the talk). Discuss writing a CFP, how to do it, what makes a good CFP and what makes a bad CFP. Assign the CFP due session III. CFPs due (leader will recruit 2-4 volunteers experienced in reviewing CFPs to read and provide feedback) Discuss writing a bio. Discuss part 1 of creating slides. Assign/Discuss/let students pick 5 minutes spe ech for session IV. (no slides needed, just to see how they present and how they talk to people, and give feedback). CFP feedback and 5 minute speeches (if possible, have volunteers who reviewed CFP listen to 5 minute speeches. If not, get other experienced speakers to listen) Discuss practicing and preparing for the presentation they will give. ​ For more information and to get involved, please email Inquiries@bichq.org . ​ ​ Welcome to the Speaker Development Program Graduation Mini-Con! This course is targeted at novice and beginner speakers in order to help them gain confidence in speaking, understand the speaker submission application process, and take them through the skills and techniques they need to create and deliver a talk from beginning to the end. This mini-con is the culmination program that brought the students through the ‘life cycle’ of speaking at conferences. The course talked and walked them through the entire process where they came up with a talk idea, submitted a “Call for Presentations” (CFP), researched and wrote their talk and are now presenting that talk. This mini-con allows them to demonstrate the skills they have learned and hard work they have put in over the past six weeks. During the length of this course, each participant learned how, why and where people speak. Most importantly each student was encouraged with the assurance that THEY can and should share their knowledge and speak at conferences. This affirmation was then leveraged to enable them to learn how to write and submit a CFP, how different conferences review, grade, and judge CFP submissions to decide who will speak. They learned different ways to research and prepare for their talk and how to prepare to write their talk. Multiple class hours were spent covering how to write and give presentations. Additionally, a class module was devoted to minor, but important subjects for presenters such as preparing to go on stage, handling questions, and what to do when the presentation is over. In the middle of that they each gave a five-minute speech in order to get feedback on the basic speaking skills. Thank you for coming and supporting them as they continue make use of their new or improved speaking skills they have acquired. We look forward to them continuing to speak in the future at other local or national events as they expand their skills and opportunities. Don’t forget to keep an eye out for future runs of this course! We all have a wealth of knowledge in our industry and stories that need to be shared from many different perspectives. Hopefully one of the next students in our group of new presenters could be you. ​ ​ September 2021 Cohort Mini-Con Schedule ​ ​ Speaker: Diondr ia Holliman ~ @diondria4309 ​ September 25, 2021 - 10:15 AM EST ​ Talk: Business Continuity and Disaster Recovery: Are you prepared this time? ​ Abstract: ​ The only thing harder than planning for a disaster is explaining why you did not. Recently 2020 disaster recovery stats published by Invenio IT, a well-known global business continuity services agency state: 75% of businesses have nothing planned. Literally no preparation for total or partial loss of data or access to it. 93% of companies without a disaster recovery plan in place who suffer a major data disaster are out of business within one year. Meanwhile, 96% of companies with a trusted backup and disaster recovery plan were able to survive ransomware attacks – one of the most common major data disasters. Business Continuity (BC) and Disaster Recovery (DR) planning are the most crucial elements of a business but are often ignored. Your data is the life blood of your business. If you lose access to it, or it is corrupted, lost, stolen or held in a ransomware attack, how long could you survive without it? My goal for this talk is to provide a practical walkthrough of terms such as RPO, RTO, and general BC + DR considerations including general disaster scenarios and more specialized ones such as ransomware. Tune in to learn more about: Distinct differences between DR and BC Fundamentals for developing an effective BC plan, and training your staff on its use. How to conduct DR testing to ensure your plans work This talk is a perfect start to revise or develop a strong business continuity & disaster recovery plan based on the changing priorities post the pandemic. Even if you have plans in place, it’s time to rewrite your playbook to fit our current risk environment. ​ Biography: ​ Diondria Holliman is on a mission to help companies better prepare their employees for disruptive events in order to respond to incidents or crisis in a calm and forward-thinking manner as it pertains to information systems. Diondria is a seasoned security professional, offering 15+ years of experience focused on Corporate Information Security Strategy, Compliance, Security Architecture, and Data Privacy and Protection. Her educational background includes both a bachelor’s & master’s degree in the computer science space. Since IT is always changing, she makes it a point to evolve with it by holding several premium industry certifications, namely the CISSP, PfMP, and PMP. Diondria brings a powerful combination of project portfolio focus and technical skills along in-depth experience working in highly regulated industries throughout her career. In addition, Diondria has several recent publications in global recognized magazines such Project Management Network and Info Security. Over the years, she has successfully forecasted the direction our industry is heading as a thought leader or what she calls her "spidey-sense" to interpret what the data is telling us. Most recently, Diondria is the recipient of the 2021 (ISC)² Mid-Career Professional Award recognizing advancements the cybersecurity field. ​ Speaker: Darnell Ware Jr. ~@LenradTech ​ September 25, 2021 - 10:30 AM EST ​ Talk: Technically Challenged: Lessons in End User Security ​ ​ Abstract: ​ I intend to speak about the fundamentals of User Security Awareness. I will begin by defining what user security is. Throughout this talk, I intend to inform, as well as educate, the audience of the importance of them being the first line of defense when it comes to information security. I plan to use real life examples and scenarios that will not only create audience engagement, and reinforce concepts, but will provide solution that can be immediately implemented for everyday use. ​ Biography: ​ IT Consultant Darnell Ware Jr. is known for his customer service by ensuring that every end user is well educated on how they can impact the cybersecurity of their business, as well as, personal interest. From his beginnings as an IT Intern at a local health clinic near Shippensburg University, to currently working with a Prime Defense Contractor to the Federal Government, Darnell has an extensive understanding of how the end user can be the make or break factor of any environment's security fitness and that it is imperative that they are made a priority. ​ Now in his 4th year in Tech, he currently serves as an System Administrator at SAIC, currently supporting the Army Corps of Engineers. In this role, he serves as an technical and management presence to his team of field technicians. Prior to his current role, Darnell served as a Technical Specialist at PayPal, where he was involved in their rapid expansion of their internal and external Credit Operations teams who supported Payroll Protection Program (PPP) loans. He has also served as a Desktop Support Analyst with Penn Medicine, being a critical asset during the initial surge of the COVID-19 Pandemic, as well as PC Technician with Jefferson Health. ​ Darnell has earned many industry certifications, including CompTIA Security+, ServiceNow Certified System Administrator, and AWS Certified Cloud Practitioner. He also holds a Bachelor of Science in Public Administration from Shippensburg University of Pennsylvania. ​ Speaker: Christen S. Madison ~@Christe05505504 ​ September 25, 2021 - 10:45 AM EST ​ Talk: Home Labs, The Tech Gym ​ Abstract: ​ Athletes exercise at the gym to perfect their skills, can a home lab do the same? This talk will discuss the importance of having a home lab and setting personal goals to achieve. ​ Biography: ​ Christen S. Madison has five CompTIA and three Microsoft computer certifications and works as a Network Administrator. He has worked in the computer field for over twenty years, with three years in banking. His area of expertise is server management, which includes everything from the initial setup to setting up permissions and securing the machines from outside intrusion. Windows, Linux, and most Berkeley System Disk Unix versions are among the operating systems with which he has experience. He is a troubleshooter for Microsoft Office, Corel, Lotus, Intuit, Peachtree, and most Adobe software and has a strong desire to assist others in improving their lives, whether monetarily or educationally. ​ Speaker: Ashley Richardson ~@[ REDACTED] ​ September 25, 2021 - 11:00 AM EST ​ Talk: What Game of Thrones taught me about Cyber Security ​ Abstract: ​ At the beginning of 2021, everyone had seen Game of Thrones, except Ashley. As she caught up on the show, she saw a number or infosec principles play out in the story. Come learn about how lessons from GoT can be applied to improve your cybersecurity. ​ Biography: ​ Ashley Richardson is a Sr. Technical Trainer with Palo Alto Networks. She is a member of Blacks In Cyber, The International Consortium of Minority Security Professionals and the Women’s Society of Cyber-Jitsu. She is currently pursuing a Master of Science in Cyber Operations and Resilience at Boise State and serving as an adjunct professor at Sacramento City College. In her spare time, she and her fellow veteran husband read, homestead and watch Game of Thrones. ​ Speaker: Yasmine Braithwaite ~ @[ REDACTED] ​ September 25, 2021 - 11:15 AM EST ​ Talk: Behavioral Mapping with MITRE ATT&CK ​ Abstract: ​ As more individuals are moving work, hobbies, and social lives online, this leads to an increase in cyber attacks. Since the majority of cyber incidents we see today are human enabled, combining areas such as behavioral intelligence and mapping of cybersecurity can improve incident detection and fill in gaps for threat defenses. Furthermore, this will allow us to recognize our behaviors or emotions before deciding how to respond in ways that aligns with our best interest. Alike our cyber hygiene, it is important to focus on our own behavioral science to identify and improve situations as they happen, in order to conquer self destructive behaviors. Cyber incidents may also follow predictable patterns that are clearly identified and therefore provide clarity in how to respond. This presentation is to explore the relevant insights of the MITRE ATT&CK Framework, and how we can map threat actors behaviors to improve detection of cyber incidents, which will ultimately force us to look within in ourselves as human factors in a digitally immersed world. ​ Biography: ​ Yasmine Braithwaite is a Cyber Analyst in the Financial Industry. She has a Bachelors degree in Criminal Justice with a minor in photography and has earned her A+ & Security+ certificate and had various internships in cyber. She is an alumni of NPower, a nonprofit organization, that focuses on technology training for young adults and has spoken at this year’s 2021, NPower’s Gala. She is a huge foodie, and enjoys spending time doing yoga, reading books and creating content for her brand Security of Mind. You can find her on LinkedIn: linkedin.com/Yasmine-braithwaite and on Instagram: Instagram.com/securityofmind ​

  • CALL FOR TRAINERS | BlacksInCyber

    CALL FOR TRAINERS Contact BIC-Training via email: BICCONF.TRAINING@GMAIL.COM to Apply.

  • MERCHANDISE | BlacksInCyber

    MERCHANDISE BIC JACKETS BICMERCH2.0 PCB "BLINKY" BADGES HOODIES MAGNETS LAPTOP CASES T-SHIRTS PHONE CASES CREW NECKS STICKERS MUGS BUTTONS LONG SLEEVE T-SHIRTS PILLOWS TAPESTRY TOTES KIDS MERCH NOTEBOOKS PATCHES FACE MASKS

  • BIC GIVES BACK | BlacksInCyber

    BIC GIVES BACK OUTREACH INITIATIVE HAVE ITEMS TO SWAP OR GIVE TO OTHERS? ​ Our next #BICGIVESBACK Book, Resource and Computer donation table and swap will be at our next physical event. ​ The table will open at 12:00pm on the day of the event to browse; all materials will be first come, first served with special consideration and browsing times for students and in need community members. If you have items to donate you may let us know in advance by filling out the form below, or simply by bringing items in the day of the event. ​ Want first dibs? Bring an item to swap or share! ​ FILL OUT THE DONATION FORM HERE.

  • WINTER CONFERENCE | BlacksInCyber

    BIC Winter Conference 2023 will be on Saturday February 25, 2023 from 9:00 AM EST - 5:00 PM EST Tickets are available here . Access the virtual venue here. BIC HQ is planning our In-Person meet up after the virtual event at 6:30 PM EST at: Skyline 609 609 H St NE 6th Floor, Washington, DC, 20002 Thank you to our sponsors! Winter Conference 2023 Call For Papers is currently closed but, usually located here. Winter Conference Sponsor Sheet Winter Conference 2023 Talk and Workshop Schedule Track # 1 - Offensive Security Engineering Speaker: Hugh Shepherd ​ Time: 10:00 AM EST ​ Title: Security Strategies for Critical and Smart Infrastructures Speaker Biography: N/A Talk Description: Security of critical infrastructure and smart infrastructure is a serious concern. As more and more of these systems become interconnected, the level of risk increases. The purpose of this talk is to raise awareness and to start a discussion on possible strategies for improved security. Speaker: Robert McNair ​ Time: 11:00 AM EST ​ Title: Cloud Security: The Importance of Defending Your Organization Speaker Biography: Robert McNair is a 2nd Generation IT Professional, Cloud Evangelist, Public Speaker and Motivator with over 20 years of experience in the IT industry. He has a passion for speaking and connecting our community to their purpose in Tech! Fun Fact: His father was a hidden figure working on developing Barcodes in the late 1960s. Talk Description: N/A Speaker: Chantel Sims ​ Time: 12:30 PM EST ​ Title: Refining Your Offensive Pentest Methodology ​ Speaker Biography: Using her background in Psychology and Education, Chantel weaves human behavior into her work as a Security Consultant with NCC Group; a global cyber and software resilience security firm. She specializes in pen testing a number of technologies across different industries and sectors. In her free time, she enjoys learning new hacking techniques, researching the cosmos, reading philosophical texts, and spending time with her loved ones. Bringing integrity, positivity, and an open mind to all things new drives her passion for hacking. Talk Description: A pentest is only as good as the pentester. For a pentester to successfully cover a client's needs, it's important that a thorough pentesting methodology is utilized. Methodologies typically expand as we gain more hands-on experience. In this talk, we'll cover elevating our methodology as pentesters within a shorter time frame while also addressing the barriers that can get in the way of learning new tools & techniques that will ultimately expand our methodology. Speaker(s): Craig Bowser and Lu Goon Time: 1:30 PM EST Title: Security Engineering != (Admin || Analyst || Responder) Speaker Biography(s): Lu Goon: N/A ​ Craig Bowser: Craig Bowser is an infosec professional with over 20 years of experience. He has worked in a number of infosec roles in the US government and is currently a Security Solutions Architect at GuidePoint Security. He is a Christian, Father, Husband, and Scout Leader who enjoys sci-fi fantasy. home networking, reading, and hiking. ​ Talk Description: The field of Security Engineering has evolved as an essential function within the Information Security industry. Security Engineers are responsible for many aspects of protecting the enterprise including designing of secure systems, supporting security operations, and protecting business platforms, data centers and the cloud. The role of Security Engineers is sometimes confused with system administrators, security analysts or even penetration testers. Yet the industry recognizes the need for Security Engineers with over 1000’s of opportunities in the DMV region alone. This talk will address questions such as “What is a security engineer?” and “Aren’t they the system administrators?” and provide practical direction for building a security engineering career. Speaker: Leron Gray ​ Time: 2:30 PM EST ​ Title: Gimme The Loot - Lemme Hold A Token Real Quick ​ Speaker Biography: Leron Gray is a senior security consultant on Bishop Fox's Red Team. With nine years o f offensive security experience, he previously served on the Azure Red Team at Microsoft, as a penetration tester, and as a Cryptologic Technician (Networks) for the U.S. Navy. Leron holds a Masters in Cyber Defense from Dakota State University and is a PhD candidate for Cyber Operations. He has a graduate certification in penetration testing and ethical hacking from SANS Technology Institute. ​ Talk Description: With many organizations building their environments from the ground up in Azure and Azure AD without traditional networks, penetration testers need to change their mindset around initial access and lateral movement to match the nature of cloud environments. Azure AD environments with no Azure provisioned infrastructure (like storage or virtual machines) have much smaller footprints than traditional networks or even hybrid AD environments. This talk will discuss some of the challenges found in pen testing pure Azure AD/Office 365 environments and provides a scenario in which we go from reconnaissance to stealing user access tokens. Post-MFA headers are like currency, so lemme hold a dollar token real quick. Speaker: LaGarian Smi th ​ Time: 3:00 PM EST ​ Title: Prepping for OSCP: Achieving Balance ​ Speaker Biography: LaGarian is an active duty Marine with nearly 20 years of service and experience in IT and Cyberspace Operations. Talk Description: This talk will cover the resources needed to prepare and pass the OSCP exam with focus on time management principles that can be applied to avoid undue stress. Track # 2 - Industry Knowledge and Academia Speaker: Dr. Cynthia Sutherland ​ Time: 10:00 AM EST ​ Title: Navigating Cybersecurity: Getting In and Staying In! ​ Speaker Biography: Dr. Cynthia Sutherland is a multiaward winning, global cybersecurity leader serving as Amazon Web Services' Global Automotive Security Assurance Lead with a 16 year cybersecurity career across multiple industries. Prior to AWS, she was the first senior executive to serve as the Chief Information Security Officer (CISO) for Federal Emergency Management Agency (FEMA) were she led integration of cybersecurity into America's emergency management systems. She came to FEMA from serving as the Joint Chiefs of Staff CISO were she led the integration of cybersecurity into military weapons for U.S., 23 countries, and NATO. Her passion is professional development and mental health of the cybersecurity profession. ​ Talk Description: Most look at Cybersecurity from the perspective of technology, cyber-attacks, and as a high demanding career field with solid compensation. However, what is not discussed is what it takes to get in, stay in, and be successful in the field. Navigating a cybersecurity career can be even more of a challenge when you have limited exposure and unconscious biases. This session navigates through the Confidentiality, Individuality, and Awareness (C.I. A.) Pillars for a Successful Cybersecurity Career, mental health as a security concern, and shows how representation does matter in cybersecurity. The goal is for participants to walk away with tips on how to close the gaps in their performance and identify their uniqueness, value to an organization, and ideas on how to increase awareness of their capabilities in their organization. Speaker: Dr. Xavier-Lewis Palmer ​ Time: 11:00 AM EST ​ Title: Simplifying Graduate School w/ Interactive Q&A Session ​ Speaker Biography: Dr. Xavier-Lewis Palmer is a multipotentialite of biology, engineering, and cybersecurity. He holds an Engineering PhD, an MS in Cybersecurity, an MS in Biotechnology, a BS in Biology, and a BA in Philosophy, with an interdisciplinary mix of numerous biology, engineering, and cybersecurity-based publications. A strong passion for both STEM education outreach and technological intersections that can improve community health and outcomes, fostered by diverse work experiences, help drive him He believes that in this ever-complex world, it is beneficial that we all keep learning, find ways to be involved in education, and help bring forth creative and helpful innovations, ideas, and conversations, where practical. Talk Description: This talk aims to simplify graduate school for those interested in Graduate School, but not knowing where to start. Topics to cover are: Reasons and Tips for Applying, Navigating the Graduate School Process from start to Graduation, and Helpful Resources. The last half is open for specific questions that the audience has that are not covered. ​ Speaker: Kassandra Pierre Time: 12:30 PM EST Title: Threat Modeling Your Careers: Creating a Plan for your Professional Success Speaker Biography: Kassandra Pierre is a champion of advocacy. She has seen firsthand the positive impact diverse spaces can have on women, individuals with disabilities, and multi-minority individuals and she recognizes allyship as imperative to unlocking human and organizational potential. Kassandra’s work with youth and adults in education and mental health care settings fuels her ongoing mental health advocacy and has enabled her to empower many people to overcome personal and professional obstacles. She is a trained crisis Interventionist and support group facilitator with over fifteen years of experience providing technical assistance and governance in the nonprofit, public and private sectors. Kassandra is a Certified Scrum Master and a Certified Scrum Product Owner currently employed as an AVP in Technology Talent Development with a global financial institution. She serves as a Disability:IN NextGen Leaders Program Mentor, has been an Advisory Board Member and presenter for the 2022 SANs Neurodiversity Summit and is the Founder and Affiliate President of the WiCyS (Women in Cybersecurity) Neurodiversity Affiliate. Kassandra is a technology enthusiast and is a nerd for threat intelligence, data privacy, and cybercrime. She is currently completing a degree in Cybersecurity and in her free time, enjoys gardening, playing with her dogs and cooking for friends and family. Contact Kassandra Pierre: Twitter:@cassdatrojan Linkedin.com/in/kassandrapierre340/ Email: kassandra@vroomtek.solutions Talk Description: N/A ​ Speaker: Dondi West Time: 1:30 PM EST Title: DEI 2.0: It’s time to see Diversity, Equity and Inclusion measured and tracked as a security control Speaker Biography: Dondi West is Global Security Counsel at TikTok where he advises senior leaders and network defenders on matters related to Cybersecurity, Incident Response, Security Governance and Security Legal Compliance. ​ Talk Description: This talk will consider diversity as a cyber readiness issue. It’s time for the security community to consider whether the level of diversity in a company's security workforce should be viewed as a security control, or factor that reduces risk. We must have a diverse security workforce to counter quickly evolving and diverse threats. Diversity and Inclusion in a company’s security workforce can no longer be viewed as an HR/recruitment issue, or a nice to have. Speaker: Ashley Sequeira TALK POSTPONED Time: 3:00 PM EST Title: From Gamestop to Google: How to leverage your personal skillset into a unique cybersecurity career Speaker Biography: Ashley Sequeira hails from Las Cruces, NM with her husband, Dan and her two dogs, Carbon Fiber and Graham Cracker. She is a recent graduate of Boise State University. During her time at Boise State University, she concluded her career at Palo Alto Networks and started with Google July 2022. While at Palo Alto Networks, she ran the Security Operations training program, consulted for SOAR platforms, worked as a Professional Services Consultant and ran an employee resource group focused on Veterans. Prior to her time at Palo Alto Networks, Ashley worked in a Security Operations Center and served 13 years in the Army Reserve. In the Army, she competed on the National Taekwondo Team(2011, 2015), played in the Army Band and learned her fundamentals in IT. She holds a Bachelor's degree from Southern New Hampshire University in General Studies, an Associate of Science in Information Systems Security, an Associate of Arts in English Literature and Communication, an Associate of Arts in English and an Associate of Arts in General Studies. Ashley holds technical certifications from SANS(GCIH), CompTIA(A+, Mobility+, Security+, CySA+), and Palo Alto Networks(PCSAE, PCDRA). Talk Description: This talk will cover my journey through cybersecurity. I began in retail and now work at Google, without writing any code. All folks involved in cybersecurity already have unique skills that can likely be leveraged to further their careers in the industry. All folks who want to break into cybersecurity also have other skills that can be leveraged to "break in". Speaker: TJ McClearin Time: 4:00 PM EST Title: Who is Xcape, Inc. and what is PTaaS? Speaker Biography: A builder of systems, infrastructure, and tech, with a concentration in security, DFIR, and cellular communications, building redundant highly available systems inside mixed unforgiving environments is my specialty. Whether on-premises, cloud-based, or mixed-use, I take pride in maximizing uptime on infrastructure through policy and automation. Coupled with my executive background, I excel working on and with teams of both engineers and decision makers, my best quality is the ability to make high-level concepts easy to understand, to provide a roadmap to success identifying hurdles and addressing them with solutions. Talk Description: N/A Track # 3 - Interactive Panels and Live Streams Speaker(s): Akil George and Melissa Daley Time: 11:00 AM EST Title: Sophisticated Scams for the Average User Speaker Biography: N/A Talk Description: Scam messages, we get them all the time. Be it emails, texts, private messages on social media; they'll always find some way to you. But with these attempts to get your sensitive information getting more and more sophisticated, how can we better defend ourselves? What do some of these look like and what are some easy ways to ensure you don't get scammed? Learn all this and more at the presentation! Speaker: Kaitlin O'Neil Time: 4:00 PM EST Title: Hiring Hacked: Using Linkedin Like a Pro Speaker Biography: Kaitlin O’Neil, is the Recruiting Manager at Bishop Fox and co-founder of the Bishop Fox mentorship program. She has spent the past ten years in technical recruiting for multiple Fortune 100 software organizations. She is passionate about connecting with diverse talent in the cybersecurity space. Talk Description: N/A Track # 4 - Workshops and Classes Speaker: Teresa Allison Time: 9:00 AM - 2:00 PM EST Title: Developing Your Cyber Career Action Plan Speaker Biography: Teresa Allison is the ISSA DC Chapter VP of Programs and Events. She is a Cybersecurity Consultant with over 20 years of experience in IT for a large consulting firm in the Washington DC Metropolitan Area. She has served as a trusted advisor to CIOs and CISOs as well as their staffs by providing them with solutions for addressing their management needs for multi-billion-dollar federal information technology programs. Talk Description: Have you been thinking about transitioning to a career in cybersecurity, but are not quite sure how to make your dream a reality? Are you currently working a cyber job but want to make a plan for advancement? This program walks you through the steps that you need to take in order to explore your cyber career options. It gives you a structured framework for exploring your interest in cyber, researching cyber positions, learning about cyber policies and standards, learning cyber tools, obtaining cyber / IT certifications, as well as applying for cyber jobs. This approach helps you to create your own cyber career action plan so that you can position yourself to join the field of cybersecurity. Speaker: Dontae Tyler Time: 2:00 PM EST Title: Cyber Hygiene 101 Speaker Biography: A community college drop-out born in Southeast Washington DC but by way of Prince Georges County, Dontae Tyler believes that success in the tech industry does not have to be traditional. With over 9 years of experience in IT, supporting various federal agencies Dontae has begun to distinguish himself as a prem ier advocate for GRC, Data Privacy and Security Awareness Training. He currently holds several certifications including CISM, CDSPE, CEH, SEC+. Dontae's unconventional cyber awareness training and education teaching methods seek to educate the everyday user and challenge the most experienced tech professionals on the evolving cyber threats. Talk Description: Dontae Tyler developed a security awareness training called Cyber Hygiene after getting tired of sitting through boring cyber security awareness videos that were not effective. After conducting his own research, He was able to come to the conclusion that the annual security training of the past was not as effective in remediating issues related to non-technical people utilizing interconnected devices and systems to complete their work. In his training he plans to equip end users with simple yet effective mitigation strategies and tools to reduce risk to acceptable levels.

  • COMMUNITY | BlacksInCyber

    ​ ​ COMMUNITY ​ Join and engage with our growing community via our BIC@Campus or BIC@Location Groups as well as our Media Outlet Directory. Our Media Outlet Directory focuses on showcasing Youtube channels, Podcasts, Social Media accounts and many more resources that showcase our community in Cybersecurity and STEM. ​ Our developing initiatives in Partnership, Mentorship, BIC Committees and Resource Sponsorships can be found below. MEDIA DIRECTORY BIC@ Groups Directory BIC LIGHTNING TALKS PARTNERSHIPS MENTORSHIP BIC COMMITTEES SCHOLARSHIPS AND VOUCHERS ONLINE COMMUNITY PHOTO GALLERY

  • BICWC2021 | BlacksInCyber

    BIC WINTER CONFERENCE 2021 CAPTURE THE FLAG & CHALLENGES CLICK HERE FOR TICKET LINK SPEAKER TRACKS

  • Allyship | Blacks In Cybersecurity, LLC. | United States

    ALLYSHIP Blacks In Cybersecurity welcomes support from the Cybersecurity and adjacent communities. "Allyship" can be described as someone who understands why / is learning how to support an underrepresented or minority group. ​ ​ The Allyship Pledge ​ I pledge to listen and learn through out my experience to understand more today than I did yesterday. ​ I pledge to add value to BIC in my interaction with the organization and that my presence at BIC events is there to give back, and not take away the community by adopting the habit of inclusion in my daily practice. ​ I pledge to continue practicing my new habit by ensuring to the best of ability that I : ​ Listen. ​ Include everyone in the conversation. ​ Try my best to provide a resource, connection and unconditional support to those who would value what I have to offer. ​ Strive to create a welcoming environment in my community and work place. Encourage and help develop those with different backgrounds than mine. ​ Speak up when I see biased and inappropriate behavior. ​ #BICAlly #BICAllyship ​ If you have questions, comments or concerns related to Allyship with BIC, please reach out to one of our directors listed here. ​ ​ The Allyship Patch/Sticker ​ Coming Soon. ​

  • CAREER SERVICES | BlacksInCyber

    BIC JOB BOARD KATIA DEAN RESOURCES

  • FALL CONFERENCE 2020 | BlacksInCyber

    COMING SOON. Call For Papers, Volunteer Registration, Call for Sponsors, Organizations, and other details are under "Events".

  • BIC VIRTUAL CONFERENCE 2020 | BlacksInCyber

    BIC VIRTUAL CONFERENCE Talks will be recorded, subscribe to our Youtube channel to stay connected! ​ ​ To play the Virtual Conference CTF please navigate to "CTF" or click here . ​ ​ ​ ​ SCHEDULE ​ PANELS

  • SPONSORS | BlacksInCyber

    The Blacks In Cybersecurity official sponsor program allows for companies and organizations to support BIC Conferences as well as year-round events to help provide resources to our community. ​ To inquire please email BIC Operations at this email . @ Amazon Web Services is a BIC-Sponsor. ​ Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. @ Palo Alto Networks is a BIC-Sponsor. ​ Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services. @ The Ford Foundation is a BIC-Sponsor. ​ We believe in the inherent dignity of all people. But around the world, too many people are excluded from the political, economic, and social institutions that shape their lives.

  • PRESS/ARTICLES | BlacksInCyber

    PRESS/ARTICLES BDPA Today Cybersecutity Africa BDPA Today Digital Guardian

  • BMIC PANEL | BlacksInCyber

    BMIC PANEL SESSION 1.0

  • MAILING LIST | Blacks In Cybersecurity, LLC.

    MAILING LIST JOIN OUR MAILING LIST! Join! Thank you for joining our mailing list!

  • ANNUAL REPORTS AND METRICS | BlacksInCyber

    ANNUAL REPORTS Blacks In Cybersecurity Headquarters, Inc. is committed to accountability through transparency and fiduciary responsibility. Our priority is ensuring the Cybersecurity community, BIC members and Allys have regular and timely access to information and a firm understanding of the BIC HQ Operations and our structure, mission, goals, metrics strategic direction. 2023 ANNUAL REPORT AVAILABLE QUARTER 1 OF 2024

  • PARTNERSHIPS | BlacksInCyber

    The BIC Ujima-Ujamaa Partnership (BIC-Partner program) program is named after the Swahili principles of Ujamaa or “Cooperative Economics” and Ujima or “Collective Work and Responsibility”. The BIC-Partner program is designed to help foster cooperative works between BIC and our Cybersecurity or STEM communities, initiatives, organizations, and businesses. Qualifications for BIC Partners: The candidate(s) must be involved in or own a Cybersecurity or STEM related community initiative, organization, and/or business that could provide a service for the BIC Community in exchange for access to our exclusive community. ​ To inquire please email BIC Opera tions at this email. @ GAWCR is a BIC-Partner. ​ The GACWR was started to offer several levels of resources for Cyber Security Professionals looking for real world, live-fire training, and practice in Red & Blue Team activities. From this mission, an Innovative Ecosystem of Technology has emerged. @ Ree The Cyber Boss, LLC. is a BIC-Partner. ​ ReeTheCyberBoss, LLC offers a variety of services such as workshops, trainings, and consultations. We also like to participate in career days, conferences, and on panels. Please visit our website: https://www.reethecyberboss.com to get more information about our services and prices. @ NABCRMP (National Association of Black Compliance & Risk Management Professionals, Inc.) is a BIC-Partner. ​ Founded in 2019, the National Association of Black Compliance & Risk Management Professionals, Inc. is a member-based 501 (c)(3) non-profit association dedicated to the professional development of African-American compliance and risk management professionals. @ Blerds Leading Technology, Inc. is a BIC-Partner. ​ Blerds Leading Technology, Inc. (BLT) exists to provide an unconventional hub for all minorities in technology that seek to advance their network and enhance their skills. Our mission is to connect talented individuals with unique opportunities for employment, education, and leadership that might not otherwise be afforded to them due to ethnicity, gender or sexual orientation. @ Running Name, LLC is a BIC-Partner. ​ Running Name LLC's mission is to aid businesses and nonprofits through security and design while creating a benchmark for online safety. @ Cybrary is a BIC-Partner. ​ Cybrary's impact initiatives are where they focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond. @ Synack is a BIC-Partner. ​ Synack's impact initiatives include creating a space for mentorship and knowledge sharing, which are force multipliers that garner better results than competition alone. You win and the customer wins. @ KC7 is a BIC-Partner. ​ The cybersecurity industry is plagued by a vicious cycle. You need a very specific set of skills to get a job, but in order to get those skills, you need access to data, which requires a job. With KC7, our goal is to break that cycle. We’re giving everyone access to realistic data that you can use to build cyber analysis skills using real tools and techniques. @ CTF Room is a BIC-Partner. ​ Africa tells a different story when it comes to professional training in cybersecurity. Our objective is to not only offer quality and affordable training to individuals in cybersecurity, but also show that Africa has a tremendous talent pool. The average cost of training a cybersecurity professional has been approximated at between $1,000 - $30,000. For a continent where such figures are astronomical, many dreams of potential disruptive innovations in this space have been shelved. We are changing this, one vault at a time. @ Capital Technology University is a BIC-Partner. ​ The mission of Capitol Technology University is to educate individuals for professional opportunities in engineering, computer and information sciences, and business. We provide relevant learning experiences that lead to success in the evolving global community.

bottom of page