Skip to content
I Help Women In Tech Earn More Money

I Help Women In Tech Earn More Money

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

Category: Conferences

Closing Keynote Speaker at Diana Initiative Virtual Conference!

August 21, 2020 Keirsten Brager

I am excited to announce that I am the closing keynote speaker for Diana Initiative Virtual Conference on Saturday 8/22/2020…

Continue Reading →

Posted in: Conferences Filed under: career advancement, conferences, women in security, women in tech

Cyberjutsu Con Speaker!

June 18, 2020 Keirsten Brager

Join us on June 20 for Cyberjutsu Con, a virtual event featuring amazing speakers from across the industry. I’ll be…

Continue Reading →

Posted in: Conferences Filed under: Cyberjutsu, women in cyber, women in tech

Women’s Society of Cyberjutsu Career Webinar Oct. 17th

October 16, 2019 Keirsten Brager

Join us on October 17th at 7pm EST for my career webinar with Women’s Society of Cyberjutsu. We’ll be discussing…

Continue Reading →

Posted in: Conferences Filed under: career advancement, Cyberjutsu, webinars, women in cyber, women in security, women in tech

HouSecCon2019 ICS Track Speaker

April 10, 2019 Keirsten Brager

I’ll be speaking at 4pm on the ICS Track: Building a Business Case for Your ICS Security Monitoring Strategy. Abstract:…

Continue Reading →

Posted in: Conferences Filed under: HOUSECCON, speaking engagements

Keynote Speaker at Diana Initiative!

August 10, 2018 Keirsten Brager

I am the Friday morning keynote speaker at Diana Initiative in Vegas this year! I’ll be speaking from 9:50 –…

Continue Reading →

Posted in: Career Tips, Conferences Filed under: keynote

Women in Security Panel at HouSecCon

March 31, 2018 Keirsten Brager

Join our panel of security leaders on the lunch stage from 11:45 – 1:00 pm at HouSecCon v8. Fresh Perspectives…

Continue Reading →

Posted in: Conferences Filed under: careers, conferences, HOUSECCON

Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes

March 28, 2018 Keirsten Brager

One of the ways I try to give back to the community is by using my writing to be the…

Continue Reading →

Posted in: Academia, Career Tips, Conferences, Critical Infrastructure Attacks Filed under: academia, Career advice

HOU.SEC.CON 7.0 Review

March 31, 2017 Keirsten Brager

You can never go wrong doing the right thing ~ Sam Van Ryder, HOU.SEC.CON Co-Founder and Tripwire Strategic Energy Accounts…

Continue Reading →

Posted in: Career Tips, Conferences Filed under: HOUSECCON, OWN IT, women in security

Let’s Connect!

  • LinkedIn
  • Twitter

Reader Favorites

  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • How To Keep Your Accomplishments In Front Of Your Boss
  • How Credentials Impacted My Career
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Pass the new CISSP Exam
  • Security+ Exam Prep Tips
  • #FinanceFridays Recap: Life Insurance
  • Salary Negotiation Tips from White Men in Tech: Part 2

Categories

Recent Posts

  • Promote Yourself. But Also, How Does Wealth Work?
  • ASK FOR THE DAM BONUS! + Last Chance for Stocks101
  • Stop Underestimating Your Value
  • Sip & Stocks101: Feb 14
  • Stocks101 Resources
  • #FinanceFridays Recap: Life Insurance
  • Closing Keynote Speaker at Diana Initiative Virtual Conference!
  • Cyberjutsu Con Speaker!
  • How I Passed My GICSP Exam
  • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
  • HouSecCon2019 ICS Track Speaker
  • Salary Negotiation Tips from White Men in Tech: Part 2
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Tripwire Resources for Aspiring Engineers
  • Tribe of Hackers out January 28th!
  • Walker’s Legacy Power15 Houston Honoree
  • University of Houston Energy Sector Cyber Career Event
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Keynote Speaker at Diana Initiative!
  • Digital Security Check-up
  • Listen While You Work
  • Did You Earn Certs & Expect a $20,000 Raise?
  • Support Other Women + Save The Date!
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • Dark Reading Women Changing The Game
  • Women in Security Panel at HouSecCon
  • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
  • It’s Ok To Be Extra
  • Go to Grad School or Get a Job?
  • How Credentials Impacted My Career
  • How She Passed Her First PCI Audit
  • Should Researchers Hack Back? My answer: NO
  • Talent Shortage Sanity Check
  • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
  • How To Write a Business Continuity Paper
  • How To Write An Abstract
  • Medical Records Breach: Part 2
  • Medical Records Breach: Part 1
  • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
  • #WeCyberToo: Dr. Stephanie Carter, CEO
  • Forensics Sources Part 4: Logs
  • HOU.SEC.CON 7.0 Review
  • Forensics Sources Part 3: File Systems
  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Forensics Sources Part 2: Memory
  • #WeCyberToo: Cassandra Giddings, Security Engineer
  • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
  • Forensics Sources Part 1: Packet Capture (PCAP)
  • Malware: How it hides, detects, and reacts
  • CASP Exam Prep. Fail. Give Back.
  • Jopwell: A Career Platform For Us, By Us
  • Security+ Exam Prep Tips
  • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
  • #WeCyberToo: Krista Theodore, Security Engineer
  • Ladies: GET OUT!
  • Security is NOT Just Hacking!
  • A 3-Pronged Approach To Insider Threats
  • How To Communicate With Non-Technical Audiences
  • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
  • Review: Teaching Cyber at the Collegiate Level
  • 80+ Back Doors Into Cyber Careers
  • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
  • SQL vs. XXS Injection Attacks Explained
  • Snort Rules for ACK Scans, Oh My!
  • ARP Attack Detection Limitations
  • IP Fragmentation vs IP Reassembly
  • How to Marry IT and OT Security
  • The Worst Cyber Crime Today
  • Cybercrime Law Review: Computer Fraud & Abuse Act
  • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
  • Most Important in Digital Forensics: Preparation or Preservation?
  • Digital Forensics: Can You Find Hidden Data?
  • 2016 ICS Security Incidents
  • Ace Your Papers & Advance Your Career
  • Power Utility Attack Lessons Learned
  • Basic and Double Encapsulation VLAN Hopping
  • Security Design Case Study
  • Pass the new CISSP Exam
Copyright © 2020 @keirstenbrager

Enjoy this blog? Please spread the love :)

  • TWITTER
  • FACEBOOK
    fb-share-icon
  • LINKEDIN
  • RSS
  • EMAIL