SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Gratitude Ignites, Growth Fortifies:
Building an unbreakable Cyber Security Village
“Life is either a daring adventure or nothing at all” ~ Helen Keller
W
H
O
?
Trupti Shiralkar
India
WORK
EDUCATION
MS in Security Informatics
Johns Hopkins University
EXPERTISE
Applied
Crypto
App Sec
Secure SDLC
Privacy Engg
INTERESTS
Cognitive Psychology
Hiking
Meditation
T
r
a
v
e
l
l
i
n
g
P
a
i
n
t
i
n
g
Product security leader
Founder, TrueNil
About Me
Five Pillars
Gratitude
Security
Village
Inspiration
Collective
Growth
~
Community
Mindfulness
Transform your security career
66 Speakers 4 Keynotes 4 Workshops 1000+ Attendees
Day of Shecurity 2024 Recap
Artificial
Intelligence
Privacy
Governance, Risk &
Compliance
EQ & Career
Day of Shecurity 2024 Trends
The Power of Gratitude
“Gratitude is a currency we can mint ourselves and
spend without fear of bankruptcy.”
~ Fred De Witt Van Amburgh
Community Support System
Security Dweebs
Motto - we rise together by lifting others
My Villages & Communities
Hedy Lamarr
Late Hollywood Actress & Inventor of
Frequency hopping
Carla Harris
Powerful African American banker
from WS, Author, Motivational
Speaker, Singer and Songwriter
Deidre Diamond
Sales Executive turned a dynamic
Entrepreneur, Founder & CEO of
CyberSN and Secure diversity
Women who Keep Inspiring Me
Empowerment Through Collective Growth
“Rising tide lifts all boats” ~ JFK
My Path to Collective Growth
Five Pillars
Gratitude
Security
Village
Inspiration
Collective
Growth
~
Community
Mindfulness
Let’s Connect

Weitere ähnliche Inhalte

Ähnlich wie Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village

Nfs short version 10 april 2008
Nfs short version 10 april 2008Nfs short version 10 april 2008
Nfs short version 10 april 2008
Coinoor
 
Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5
Jim Cathcart
 
JUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsJUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine Hamptons
Christopher Dwight London
 
Sponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDC
Sherry Snipes
 

Ähnlich wie Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village (20)

Brand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYTBrand Identity Research: H&M, Starbucks, and NYT
Brand Identity Research: H&M, Starbucks, and NYT
 
Nfs short version 10 april 2008
Nfs short version 10 april 2008Nfs short version 10 april 2008
Nfs short version 10 april 2008
 
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdfThe 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
The 10 Most Ambitious Women in Business to Follow_ 2022_compressed.pdf
 
Creative Superpowers (Aug18)
Creative Superpowers (Aug18)Creative Superpowers (Aug18)
Creative Superpowers (Aug18)
 
Becoming a Conscious Host: Catalyzing Change in Your Community
Becoming a  Conscious Host: Catalyzing Change in Your CommunityBecoming a  Conscious Host: Catalyzing Change in Your Community
Becoming a Conscious Host: Catalyzing Change in Your Community
 
Communicating Vision and Value
Communicating Vision and ValueCommunicating Vision and Value
Communicating Vision and Value
 
Social Capital - How To Create & Use It
Social Capital - How To Create & Use ItSocial Capital - How To Create & Use It
Social Capital - How To Create & Use It
 
Reputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media RevisedReputation Management In The Age Of Social Media Revised
Reputation Management In The Age Of Social Media Revised
 
Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5Cathcart SPEAKER November 2016-5
Cathcart SPEAKER November 2016-5
 
JUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine HamptonsJUNE 2015 Society Column SL Magazine Hamptons
JUNE 2015 Society Column SL Magazine Hamptons
 
Re-branding Islam through Digital Marketing
Re-branding Islam through Digital MarketingRe-branding Islam through Digital Marketing
Re-branding Islam through Digital Marketing
 
All hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreatAll hands on deck for siemens medical solutions western zone leadership retreat
All hands on deck for siemens medical solutions western zone leadership retreat
 
Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016Hacking CT Lessons Learned H4Dip Stanford 2016
Hacking CT Lessons Learned H4Dip Stanford 2016
 
Hacking CT Lessons Learned Final
Hacking CT Lessons Learned FinalHacking CT Lessons Learned Final
Hacking CT Lessons Learned Final
 
Myths of Innovation
Myths of InnovationMyths of Innovation
Myths of Innovation
 
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
You Posted What!? How to Use the Internet and Social Media to Harness the Dys...
 
Sponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDCSponsorship Prospectus DANDIs 2015 GDC
Sponsorship Prospectus DANDIs 2015 GDC
 
DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015DANDI AWARDS & EXECUTIVE FORUM 2015
DANDI AWARDS & EXECUTIVE FORUM 2015
 
Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020Human side of The Project Economy - PMI Ghana Oct 2020
Human side of The Project Economy - PMI Ghana Oct 2020
 
Dealing with difficult dialogue
Dealing with difficult dialogueDealing with difficult dialogue
Dealing with difficult dialogue
 

Mehr von Trupti Shiralkar, CISSP

The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
Trupti Shiralkar, CISSP
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
Trupti Shiralkar, CISSP
 

Mehr von Trupti Shiralkar, CISSP (13)

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 

Kürzlich hochgeladen

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Kürzlich hochgeladen (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security Village