“Wendy is kind, patient, and understanding. Her ability to distill complex topics down to ELI5 sound bites are rivaled and matched by no one. I would happily recommend Wendy to anyone and would leap at the opportunity to work with her again. She made all of us better by ensuring we had mastery of the hardest to master ideas in infosec. She is the rising tide and she raises all boats around her.”
Wendy Nather
Fort Collins, Colorado, United States
8K followers
500+ connections
About
Strategist, research director, former industry analyst and former CISO. 40+ years'…
Activity
-
Today, I did something I haven't voluntarily done in at least 20 years. I subscribed to a newsletter. My whole professional and personal…
Today, I did something I haven't voluntarily done in at least 20 years. I subscribed to a newsletter. My whole professional and personal…
Posted by Wendy Nather
-
Please note: if someone asks you to record a podcast with Michelle Finneran Dennedy and Edna Conway, YOU SAY YES! Thank you, Tom Field, for getting…
Please note: if someone asks you to record a podcast with Michelle Finneran Dennedy and Edna Conway, YOU SAY YES! Thank you, Tom Field, for getting…
Posted by Wendy Nather
-
Currently watching the livestream from SET University's demo day for its Generation H initiative: https://lnkd.in/gw5CGgsA "Generation H is a…
Currently watching the livestream from SET University's demo day for its Generation H initiative: https://lnkd.in/gw5CGgsA "Generation H is a…
Shared by Wendy Nather
Experience
Volunteer Experience
-
Volunteer presenter
Girlstart
- 2 years 1 month
Science and Technology
Created and presented workshops on security for the annual Expanding Your Horizons Conference (now Girls in STEM) for middle-school girls.
-
Guest lecturer - computer science
The University of Texas at Austin
- Present 9 years 2 months
Education
Lectured on cybersecurity risk analysis and threat modeling for undergraduate computer science class (CS 361).
Publications
-
A Peek Into the Psychographics of the CISO
451 Research
Market sizing may tell us what enterprises are buying, but it doesn’t necessarily tell us why they’re buying it. Unless a security technology is bought for compliance – and we consider compliance to be a fully populated security market in its own right – the rationale and motivation for security spending becomes murkier.
Other authorsSee publication -
The Cloud Security Rules
Roer
The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is…
The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. Questions you will find answers about include: - Do I have to accept that standard SLA? - What should an SLA include? - What standards should I be paying attention to, if any? - How do I treat mobile workers, and how do they fit into the cloud? - Do I really need to care about logging? - Many more! Since the cloud computing is global, you risk using service providers in other countries than your own - even if you only operate in your own country. The Cloud Security Rules aims at helping you understand the risks involved, and help you determine the best strategy for your organization.
Other authorsSee publication
Honors & Awards
-
Security Pioneer, CyberScoop 50 Awards
CyberScoop
https://www.cyberscoop.com/announcing-2021-cyberscoop-50-award-winners/
-
Infosecurity Europe Hall of Fame
Infosecurity Magazine and Infosecurity Europe Conference
https://www.infosecurityeurope.com/en-gb/whats-on/hall-of-fame.html
The Infosecurity Magazine and Infosecurity Europe Editorial and Content teams select the Hall of Fame inductee. The selection process is based on four key criteria. Hall of Fame inductees must:
Be an internationally recognised and respected information security practitioner or advocate
Have made a clear and long-term (over 10 years) contribution to the advancement of information security
Have…https://www.infosecurityeurope.com/en-gb/whats-on/hall-of-fame.html
The Infosecurity Magazine and Infosecurity Europe Editorial and Content teams select the Hall of Fame inductee. The selection process is based on four key criteria. Hall of Fame inductees must:
Be an internationally recognised and respected information security practitioner or advocate
Have made a clear and long-term (over 10 years) contribution to the advancement of information security
Have provided intellectual or practical input that has contributed to and accelerated the advancement of information security
Be an engaging thought-leader demonstrating creativity and original thinking in information security -
SC Media Reboot Leadership Award - Influencer
SC Magazine
https://www.scmagazine.com/home/events/reboot-leadership-awards-2018/influencer-wendy-nather/
-
Women in IT Security "Power Player"
SC Magazine
https://www.scmagazine.com/home/security-news/features/2014-women-in-it-security-wendy-nather/
Languages
-
English
-
-
German
-
Recommendations received
6 people have recommended Wendy
Join now to viewMore activity by Wendy
-
On December 12th, the Cybersecurity Coalition and the Cyber Threat Alliance are hosting #CybernextDC. This event will delve into the current…
On December 12th, the Cybersecurity Coalition and the Cyber Threat Alliance are hosting #CybernextDC. This event will delve into the current…
Shared by Wendy Nather
-
This past weekend was invigorating as all get-out, as I got to work with Pablo Breuer, Ph.D., Jennifer Ewbank, Jen Walker, Daniella Taveau…
This past weekend was invigorating as all get-out, as I got to work with Pablo Breuer, Ph.D., Jennifer Ewbank, Jen Walker, Daniella Taveau…
Posted by Wendy Nather
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More