{"id":182281,"date":"2023-03-31T06:00:24","date_gmt":"2023-03-31T13:00:24","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=182281"},"modified":"2023-04-02T21:55:43","modified_gmt":"2023-04-03T04:55:43","slug":"recognizing-the-inspirational-voices-at-palo-alto-networks","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2023\/03\/recognizing-the-inspirational-voices-at-palo-alto-networks\/","title":{"rendered":"Recognizing the Inspirational Voices at Palo Alto Networks"},"content":{"rendered":"<h2><a id=\"post-182281-_79rwsxhwv95l\"><\/a>Women's History Month 2023<\/h2>\n<p>As I reflect on Women\u2019s History Month 2023, we\u2019ve done much to recognize talented women from Palo Alto Networks and beyond \u2013 spotlighting the exceptional <a href=\"https:\/\/www.youtube.com\/watch?v=-AdRssOc2pY\" rel=\"nofollow,noopener\" >women of JAPAC<\/a>, sharing stories from our <a href=\"https:\/\/www.google.com\/url?q=https:\/\/www.paloaltonetworks.com\/blog\/tag\/womens-history-month\/&amp;sa=D&amp;source=docs&amp;ust=1680115793266801&amp;usg=AOvVaw1DGbXwMbk1z_vN3ODOrPk3\" rel=\"nofollow,noopener\" >partners<\/a> and <a href=\"https:\/\/jobs.paloaltonetworks.com\/en\/blog\/corporate-responsibility\/cyber-scholar-dedicated-to-delivering-for-women\/\">Cyber Scholars<\/a> from the <a href=\"https:\/\/start.paloaltonetworks.com\/cyber-stars.html\">Cyber STARS<\/a> initiative, celebrating that we joined the <a href=\"https:\/\/women.ca.gov\/about-the-pay-equity-pledge\/\" rel=\"nofollow,noopener\" >California Equal Pay Pledge<\/a>, and I was honored to be recognized among other brilliant women leaders for the <a href=\"https:\/\/www.securityindustry.org\/professional-development\/women-in-security-forum\/wisf-power-100\/\" rel=\"nofollow,noopener\" >2023 SIA Women in Security Forum Power 100<\/a>.<\/p>\n<h3><a id=\"post-182281-_mw5dnkal7mi9\"><\/a>Educating for an Inclusive and Diverse Workforce<\/h3>\n<p>While I am proud of all the work my team and I do \u2013 from industry-leading threat research to helping organizations around the world protect themselves from the most sophisticated cyber adversaries, and so much more \u2013 a part of my role that I significantly value is educating on cybersecurity across a variety of audiences. <a href=\"https:\/\/www.isc2.org\/Research\/Workforce-Study\" rel=\"nofollow,noopener\" >Studies<\/a> have shown the global cybersecurity workforce gap is approximately 3.4 million people, and in 2022 women held <a href=\"https:\/\/cybersecurityventures.com\/wp-content\/uploads\/2022\/09\/Women-In-Cybersecurity-2022-Report-Final.pdf\" rel=\"nofollow,noopener\" >25%<\/a> of the cybersecurity jobs globally. Educating and inspiring the next generation of cyber leaders is key in attracting interest from those early in their careers, academics in higher education, K-12 students and even Boards and C-suites.<\/p>\n<p>At Palo Alto Networks, we support and have created educational programs that can make a difference for all ages, genders, skill levels and backgrounds. Innovation needs diversity of thought and experience, and we are committed to building an inclusive and diverse cyber workforce. In the spirit of Women\u2019s History Month, I took a step back to reference media coverage featuring some of the strong voices of our influential women. These women are truly making a difference in the cybersecurity space and work tirelessly to make each day safer and more secure than the one before, all while inspiring the next-generation of cyber professionals.<\/p>\n<h3><a id=\"post-182281-_dt37jvlpm4il\"><\/a>Voices of the Women of PANW<\/h3>\n<p>Hear from some of the leading Palo Alto Networks women in cybersecurity, featured in top-tier publications:<\/p>\n<p><em>\u201cAt the foundation of cybersecurity is the need to understand your risks and how to minimize them. Individuals and organizations often think about risk in terms of what they\u2019re trying to protect\u2026 What\u2019s often missing is a comprehensive approach to risk management and a strategy that considers more than just data.\u201d<\/em><\/p>\n<p>- Dr. May Wang, CTO of IoT Security at Palo Alto Networks, in <a href=\"https:\/\/www.cio.com\/article\/407901\/whats-missing-in-most-cisos-security-risk-management-strategies.html\" rel=\"nofollow,noopener\" >CIO.com<\/a><\/p>\n<p><em>\u201cHaving responded to some of the largest security incidents during my career, I\u2019ve found that while awareness is growing, cybersecurity still isn\u2019t always top-of-mind unless an organization has suffered a major breach\u2026 BODs must prioritize cybersecurity to guarantee the safety of their organization\u2026\u201d<\/em><\/p>\n<p>- Wendi Whitmore, Senior Vice President of Unit 42 at Palo Alto Networks, in <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/12\/14\/board-blindspots-what-boards-need-to-prioritize-when-it-comes-to-cybersecurity\/?sh=20506f0038c0\" rel=\"nofollow,noopener\" >Forbes<\/a><\/p>\n<p><em>\u201cRansomware gangs target victims using these tactics with the intention of pressuring them to pay more and with greater urgency\u2026 Fighting back against the challenge of productized ransomware requires a multifaceted cyber threat engagement strategy. Maintaining good general cyber hygiene and implementing security awareness training are the foundational starting points\u2026\u201d<\/em><\/p>\n<p>- Anna Chung is a Principal Researcher at Palo Alto Networks Unit 42, in <a href=\"https:\/\/www.techradar.com\/opinion\/ransomware-as-a-service-managing-the-productized-ransomware-threat\" rel=\"nofollow,noopener\" >TechRadar<\/a><\/p>\n<p><em>\u201c... Organisations across Australia are becoming more aware of cyber risks and the importance of educating staff, their customers and even students on how to mitigate these risks. Many companies are incorporating cyber security as part of their workplace curriculum and regularly test the effectiveness of that training, for example, via phishing email testing.\u201d<\/em><\/p>\n<p>- Sarah Sloane, head of government affairs and public policy at Palo Alto Networks, in <a href=\"https:\/\/www.cio.com\/article\/411523\/is-your-cyber-education-program-up-to-scratch.html\" rel=\"nofollow,noopener\" >CIO.com<\/a><\/p>\n<h3><a id=\"post-182281-_1mh4zsw28uzq\"><\/a>Proud to Be a Woman in Cyber<\/h3>\n<p>These are just a few of my prestigious, industry-leading women colleagues. This month and every month, they use their expertise and voice to share business-critical information, help keep our world secure, and most importantly, inspire those they reach \u2013 customers, partners, early-career cyber professionals, grade-level students and beyond.<\/p>\n<p>At Palo Alto Networks, inclusion is a core value of our culture. While inclusion and diversity are paramount in enabling a welcoming and inspiring work environment, they also allow for greater and faster innovation, which is crucial for cybersecurity professionals to stay ahead of sophisticated adversaries.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For Women\u2019s History Month 2023, we\u2019ve done much to recognize talented women in tech, from Palo Alto Networks and beyond.<\/p>\n","protected":false},"author":89,"featured_media":182288,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719],"tags":[7551],"coauthors":[736],"class_list":["post-182281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","tag-womens-history-month"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/03\/Meeting-2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/182281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=182281"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/182281\/revisions"}],"predecessor-version":[{"id":182302,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/182281\/revisions\/182302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/182288"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=182281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=182281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=182281"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=182281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}