Skip to content
Career Advice for Women in Security

Career Advice for Women in Security

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

Walker’s Legacy Power15 Houston Honoree

December 7, 2018 Keirsten Brager

Carrying on Madam C.J. Walker’s Legacy (1867-1919) Madam C.J. Walker was the first Black woman to become a self-made millionaire in…

Continue Reading →

Posted in: Awards Filed under: awards, leadership

University of Houston Energy Sector Cyber Career Event

November 14, 2018 Keirsten Brager

Join us at the University of Houston for a full day of talks and panels about cybersecurity careers in the…

Continue Reading →

Posted in: Academia, Career Tips Filed under: events, universities

How To Keep Your Accomplishments In Front Of Your Boss

November 11, 2018 Keirsten Brager

Welcome to Part 2 of the article I wrote in May called Did You Earn Certs & Expect a $20,000…

Continue Reading →

Posted in: Career Tips, Secure The InfoSec Bag Filed under: career advancement, communication skills, imposter syndrome, promotions

Keynote Speaker at Diana Initiative!

August 10, 2018 Keirsten Brager

I am the Friday morning keynote speaker at Diana Initiative in Vegas this year! I’ll be speaking from 9:50 –…

Continue Reading →

Posted in: Career Tips, Conferences Filed under: keynote

Digital Security Check-up

Keirsten Brager

Are you looking for tips to protect yourself online? Check out my recent article on Homeland Security Today. I walk…

Continue Reading →

Posted in: Academia, user security Filed under: online safety, user awareness, user security

Listen While You Work

June 12, 2018 Keirsten Brager

I hope you’re having an amazing week! Work and self-care have kept me away from writing lately. If you have…

Continue Reading →

Posted in: Career Tips, Podcast/Webinar

Did You Earn Certs & Expect a $20,000 Raise?

May 7, 2018 Keirsten Brager

So You Want A Raise ~ Part I: You work full-time and recently invested all of your free time in…

Continue Reading →

Posted in: Career Tips, Secure The InfoSec Bag Filed under: career tips, certifications, salary negotiations, Secure The InfoSec Bag

Support Other Women + Save The Date!

April 18, 2018 Keirsten Brager

If you have been following me for more than 24 hours, then you know that I am an advocate of…

Continue Reading →

Posted in: Career Tips, Talent Spotlight Filed under: ICS security, panels, Stephanie Ihezukwu, women in security

Secure The InfoSec Bag: Six Figure Career Guide For Women

April 4, 2018 Keirsten Brager

Secure The InfoSec Bag Is here! CLICK HERE FOR DETAILS!

Continue Reading →

Posted in: Career Tips, Secure The InfoSec Bag

Dark Reading Women Changing The Game

March 31, 2018 Keirsten Brager

Dark Reading published a list of women in security who are quietly changing the game. I am honored to be…

Continue Reading →

Posted in: Media profiles, Talent Spotlight Filed under: Dark Reading

Post navigation

Page 2 of 8
← Previous 1 2 3 … 8 Next →

Let’s Connect!

  • LinkedIn
  • Twitter

Reader Favorites

  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • How Credentials Impacted My Career
  • Pass the new CISSP Exam
  • Security+ Exam Prep Tips
  • #FinanceFridays Recap: Life Insurance
  • Salary Negotiation Tips from White Men in Tech: Part 2

Categories

Recent Posts

  • #FinanceFridays Recap: Life Insurance
  • Closing Keynote Speaker at Diana Initiative Virtual Conference!
  • Cyberjutsu Con Speaker!
  • How I Passed My GICSP Exam
  • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
  • HouSecCon2019 ICS Track Speaker
  • Salary Negotiation Tips from White Men in Tech: Part 2
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Tripwire Resources for Aspiring Engineers
  • Tribe of Hackers out January 28th!
  • Walker’s Legacy Power15 Houston Honoree
  • University of Houston Energy Sector Cyber Career Event
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Keynote Speaker at Diana Initiative!
  • Digital Security Check-up
  • Listen While You Work
  • Did You Earn Certs & Expect a $20,000 Raise?
  • Support Other Women + Save The Date!
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • Dark Reading Women Changing The Game
  • Women in Security Panel at HouSecCon
  • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
  • It’s Ok To Be Extra
  • Go to Grad School or Get a Job?
  • How Credentials Impacted My Career
  • How She Passed Her First PCI Audit
  • Should Researchers Hack Back? My answer: NO
  • Talent Shortage Sanity Check
  • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
  • How To Write a Business Continuity Paper
  • How To Write An Abstract
  • Medical Records Breach: Part 2
  • Medical Records Breach: Part 1
  • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
  • #WeCyberToo: Dr. Stephanie Carter, CEO
  • Forensics Sources Part 4: Logs
  • HOU.SEC.CON 7.0 Review
  • Forensics Sources Part 3: File Systems
  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Forensics Sources Part 2: Memory
  • #WeCyberToo: Cassandra Giddings, Security Engineer
  • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
  • Forensics Sources Part 1: Packet Capture (PCAP)
  • Malware: How it hides, detects, and reacts
  • CASP Exam Prep. Fail. Give Back.
  • Jopwell: A Career Platform For Us, By Us
  • Security+ Exam Prep Tips
  • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
  • #WeCyberToo: Krista Theodore, Security Engineer
  • Ladies: GET OUT!
  • Security is NOT Just Hacking!
  • A 3-Pronged Approach To Insider Threats
  • How To Communicate With Non-Technical Audiences
  • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
  • Review: Teaching Cyber at the Collegiate Level
  • 80+ Back Doors Into Cyber Careers
  • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
  • SQL vs. XXS Injection Attacks Explained
  • Snort Rules for ACK Scans, Oh My!
  • ARP Attack Detection Limitations
  • IP Fragmentation vs IP Reassembly
  • How to Marry IT and OT Security
  • The Worst Cyber Crime Today
  • Cybercrime Law Review: Computer Fraud & Abuse Act
  • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
  • Most Important in Digital Forensics: Preparation or Preservation?
  • Digital Forensics: Can You Find Hidden Data?
  • 2016 ICS Security Incidents
  • Ace Your Papers & Advance Your Career
  • Power Utility Attack Lessons Learned
  • Basic and Double Encapsulation VLAN Hopping
  • Security Design Case Study
  • Pass the new CISSP Exam

ConvertKit Form

Copyright © 2020 @keirstenbrager