Page 162 - Cyber Defense Magazine RSA Edition for 2021
P. 162
Spotlight on Women in Cybersecurity
By Carolyn Crandall, Chief Security Advocate and CMO, Attivo Networks, Inc.
“There are a wide variety of roles for women in
cybersecurity. Don’t let any job description intimidate you,
and if it feels like it is a stretch, all the better. Be who you
want to be. Go for the job that you want to have. You’ve got
this!”
I started my career in technology while still attending college. Going into high-tech was and wasn’t
something that I had given much thought to. At the time, I was obtaining a degree in electrical engineering
and computer science. Why? Mainly because it seemed like a challenge, and I wanted to break down
the perception that women couldn’t do it. During this time, I don’t recall ever hearing a murmur about
cybersecurity.
Admittedly, I loved technology but was a terrible coder. I tended to overthink things. As luck would have
it, I secured a part-time position as an assistant to a vice president of marketing at a computer
manufacturer. In this role and throughout my career, I was exposed to endless innovation that brought
technology from mainframes down to compute and storage that could easily be held in the palm of my
hand. It has been truly fascinating, and it opened my eyes to the numerous jobs for women in technology.
Fast forward to today, I am truly honored to be recognized as a top woman in cybersecurity. I have worked
for notable companies like Cisco, Seagate, Riverbed, and others that have given me fantastic
experiences with technology and security. Attivo Networks, where I am the Chief Security Advocate and
CMO, has provided me with an excellent opportunity to further my career in cybersecurity. Here, I heavily
invest my time educating the market on solving business problems with innovations in cybersecurity
technology. I am a frequent presenter, blogger, and writer; I have also been profiled in the Mercury News
and have been a guest speaker on Fox News. My articles can be found in a variety of publications, and
you can read the book I co-authored called Deception-Based Threat Detection: Shifting Power to the
Defenders. I am also an advisor to the Santa Clara University Executive MBA program, where I support
education and career development programs for our next generation of cybersecurity and technology
leaders.
162