- This event has passed so registration is closed.
Overview
The 360 degree leader methodology has been used in businesses to determine the influence of leadership in organizations from various roles. In this talk, Tanisha discusses how a 360 degree model can be applied to cyber security leadership and business practices to improve workflow and efficiency. She will provide examples of how to implement strategies that are beneficial and will improve productivity.
Moderator
Speaker/s
Tanisha L. Turner – Senior Security QA Engineer - Security Engineering Productivity, Elastic
Tanisha L. Turner is an experienced cyber security professional in security operations, malware analysis & identification, and threat detections. She participates in non-profit cyber security organizations and has held executive leadership and advisory roles. Tanisha is active in the cyber security community and has participated in many speaking engagements and her recent tech talk was with Elastic for October Cybersecurity Awareness Month: Women in Security Elastic Summit: Behavioral Analytics and Threat Detections
She has been featured and recognized on lists that include Epic Women in Cybersecurity and 21 Women In Cybersecurity You Should Know.
Tanisha holds a Bachelors of Science in Information Security and an Associate of Science in Network Security. She is known as cybersecdiva in the cyber security community, and she has an Introduction to Malware Analysis and Reverse Engineering Series for beginners.
Please feel free to connect with Tanisha L. Turner on LinkedIn or follow her on Mastodon:
LinkedIn: https://www.linkedin.com/in/tanisha-l-t-079a7b17
Mastodon: https://infosec.exchange/@cybersecdiva
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.