Wendy Nather

Wendy Nather

Fort Collins, Colorado, United States
8K followers 500+ connections

About

Strategist, research director, former industry analyst and former CISO. 40+ years'…

Activity

Join now to see all activity

Experience

  • TBD Graphic

    TBD

    Fort Collins, Colorado, United States

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Austin, Texas, United States

  • -

    Austin, Texas Metropolitan Area

  • -

    Austin, Texas Area

  • -

    Austin, Texas Area

  • -

    Austin, Texas Area

  • -

    Austin, Texas Area

  • -

    Chicago, Illinois, United States

  • -

    London, England, United Kingdom

  • -

    Zurich, Switzerland

  • -

    Chicago, Illinois, United States

Volunteer Experience

  • Girlstart Graphic

    Volunteer presenter

    Girlstart

    - 2 years 1 month

    Science and Technology

    Created and presented workshops on security for the annual Expanding Your Horizons Conference (now Girls in STEM) for middle-school girls.

  • The University of Texas at Austin Graphic

    Guest lecturer - computer science

    The University of Texas at Austin

    - Present 9 years 2 months

    Education

    Lectured on cybersecurity risk analysis and threat modeling for undergraduate computer science class (CS 361).

  • ISSA India Graphic

    Patron, Women in Cybersecurity SIG

    ISSA India

    - Present 5 years 6 months

    Science and Technology

Publications

  • A Peek Into the Psychographics of the CISO

    451 Research

    Market sizing may tell us what enterprises are buying, but it doesn’t necessarily tell us why they’re buying it. Unless a security technology is bought for compliance – and we consider compliance to be a fully populated security market in its own right – the rationale and motivation for security spending becomes murkier.

    Other authors
    See publication
  • The Cloud Security Rules

    Roer

    The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is…

    The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. Questions you will find answers about include: - Do I have to accept that standard SLA? - What should an SLA include? - What standards should I be paying attention to, if any? - How do I treat mobile workers, and how do they fit into the cloud? - Do I really need to care about logging? - Many more! Since the cloud computing is global, you risk using service providers in other countries than your own - even if you only operate in your own country. The Cloud Security Rules aims at helping you understand the risks involved, and help you determine the best strategy for your organization.

    Other authors
    See publication

Honors & Awards

  • Security Pioneer, CyberScoop 50 Awards

    CyberScoop

    https://www.cyberscoop.com/announcing-2021-cyberscoop-50-award-winners/

  • Infosecurity Europe Hall of Fame

    Infosecurity Magazine and Infosecurity Europe Conference

    https://www.infosecurityeurope.com/en-gb/whats-on/hall-of-fame.html

    The Infosecurity Magazine and Infosecurity Europe Editorial and Content teams select the Hall of Fame inductee. The selection process is based on four key criteria. Hall of Fame inductees must:

    Be an internationally recognised and respected information security practitioner or advocate

    Have made a clear and long-term (over 10 years) contribution to the advancement of information security

    Have…

    https://www.infosecurityeurope.com/en-gb/whats-on/hall-of-fame.html

    The Infosecurity Magazine and Infosecurity Europe Editorial and Content teams select the Hall of Fame inductee. The selection process is based on four key criteria. Hall of Fame inductees must:

    Be an internationally recognised and respected information security practitioner or advocate

    Have made a clear and long-term (over 10 years) contribution to the advancement of information security

    Have provided intellectual or practical input that has contributed to and accelerated the advancement of information security

    Be an engaging thought-leader demonstrating creativity and original thinking in information security

  • SC Media Reboot Leadership Award - Influencer

    SC Magazine

    https://www.scmagazine.com/home/events/reboot-leadership-awards-2018/influencer-wendy-nather/

  • Women in IT Security "Power Player"

    SC Magazine

    https://www.scmagazine.com/home/security-news/features/2014-women-in-it-security-wendy-nather/

Languages

  • English

    -

  • German

    -

Recommendations received

More activity by Wendy

View Wendy’s full profile

  • See who you know in common
  • Get introduced
  • Contact Wendy directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses