From Excel to Excellence: Revitalizing IT Risk Strategies for a Future-Ready Landscape
Effective IT risk management is necessary to safeguard valuable assets, achieve organizational objectives, and…
Is a security consultant, with a current focus on the intersection of software engineering practices and agile GRC. Understanding digital exposure is her specialty, as she researches the open and dark web to identify an organization’s true attack surface. She works with development teams to translate business risks, improve security practices in the software development lifecycle, introduce secure by design principles and loves working with data to uncover new insights. If she’s not breaking software, she’s helping fix it.
Effective IT risk management is necessary to safeguard valuable assets, achieve organizational objectives, and…
This website uses cookies to enhance your experience. Some are essential for site functionality, while others help us analyze and improve your usage experience. Please review your options and make your choice.
If you are under 16 years old, please ensure that you have received consent from your parent or guardian for any non-essential cookies.
Your privacy is important to us. You can adjust your cookie settings at any time. For more information about how we use data, please read our privacy policy. You may change your preferences at any time by clicking on the settings button below.
Note that if you choose to disable some types of cookies, it may impact your experience of the site and the services we are able to offer.
Some required resources have been blocked, which can affect third-party services and may cause the site to not function properly.
We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.