X
Stop Guessing. Start Measuring. Rationalize Cyber Investments with Metrics that Matter® –
Learn More
Why Consortium
Metrics that Matter®
Solutions
Risk Management
Risk Management Overview
Cyber Risk Assessment
Cyber Tools Rationalization
Attack Surface Management
Attack Surface Management Overview
Application Security Risk Assessment
Compromise Assessment Services
Dark Web Threat Intelligence
Digital Forensics and Incident Response (DFIR)
Offensive Security Services
Program Optimization
Program Optimization Overview
Tailored Cybersecurity Solutions Management, MDR, MSSP
SOC Maturity Assessment
SOAR Integration with SIEM
Secure Backup and Resilient Recovery
Incident Response Readiness
Security Optimization Case Management
Custom and Adaptive Cybersecurity Solutions
Network and Edge Security COE
Network and Edge Security COE Overview
NGFW Integration and Optimization
Zero Trust Network Architecture Maturity Assessment
Observability COE
Observability Overview
Cribl LogStream Migration and Setup
SIEM Platform Setup and Migration
Advanced SIEM Rule Tuning
SOC Workflow Optimization
Telemetry Data Optimization
Advanced SIEM Performance Tuning
CrowdStrike COE
CrowdStrike COE Overview
Falcon Platform Health Check
Identity Security Risk Assessment
Legacy SIEM Review
Live Fire Exercise
Next Generation SIEM Solutions
Partners
Consortium Labs
About Us
Company
Community
Our Leadership
Careers
Resources
Contact Us
Why Consortium
Metrics that Matter®
Solutions
Risk Management
Risk Management Overview
Cyber Risk Assessment
Cyber Tools Rationalization
Attack Surface Management
Attack Surface Management Overview
Application Security Risk Assessment
Compromise Assessment Services
Dark Web Threat Intelligence
Digital Forensics and Incident Response (DFIR)
Offensive Security Services
Program Optimization
Program Optimization Overview
Tailored Cybersecurity Solutions Management, MDR, MSSP
SOC Maturity Assessment
SOAR Integration with SIEM
Secure Backup and Resilient Recovery
Incident Response Readiness
Security Optimization Case Management
Custom and Adaptive Cybersecurity Solutions
Network and Edge Security COE
Network and Edge Security COE Overview
NGFW Integration and Optimization
Zero Trust Network Architecture Maturity Assessment
Observability COE
Observability Overview
Cribl LogStream Migration and Setup
SIEM Platform Setup and Migration
Advanced SIEM Rule Tuning
SOC Workflow Optimization
Telemetry Data Optimization
Advanced SIEM Performance Tuning
CrowdStrike COE
CrowdStrike COE Overview
Falcon Platform Health Check
Identity Security Risk Assessment
Legacy SIEM Review
Live Fire Exercise
Next Generation SIEM Solutions
Partners
Consortium Labs
About Us
Company
Community
Our Leadership
Careers
Resources
Contact Us
Home
Resources
Story Behind the Story
Women in Tech
Story Behind
the Story
Discover the untold journeys of successful women in tech. Story Behind the Story features in-depth articles and interviews showcasing the leaders shaping the industry.
Nastassia Tamari
Nastassia Tamari Director Of Information Security— Regions; Becton, Dickinson, And Company (Bd)
Women in Tech
Melissa Griffith
Lecturer In Technology And National Security At Johns Hopkins University School Of Advanced International Studies (Sais) Original Interview in November 2022
Women in Tech
Sandra Joyce
Vice President at Google Cloud, Head of Mandiant Intelligence Original Interview in December 2022
Women in Tech
Theresa Payton
First Female White House Cio, Ceo Of Fortalice Solutions Original Interview, February 14, 2023
Women in Tech
Masha Sedova
Co-Founder of Elevate Security Interview Conducted August, 2023
Women in Tech
Col. Candice Frost (Ret.)
Former commander, US cyber command joint operations intelligence command Original Interview in October 2023
Women in Tech
Maria-Kristina Hayden
Founder and CEO of OUTFOXM Original Interview in November 2023
Women in Tech
Michelle Valdez
Chief Information Security Officer, Onemain Financial Original Interview, September 24, 2020
Women in Tech
Patricia Titus
Chief Information Security Officer And Chief Privacy Officer – Markel Corporation Original Interview on June 2019
Women in Tech
Nashira Washington Layade
Svp, Chief Information Security Officer For Realogy Holdings Corp. Original Interview, June 28, 2018
Women in Tech
Susan Koski
Svp And Director Of Security And Fraud Operations For Pnc Bank Original Interview, January 29, 2019
Women in Tech
Quiessence Phillips
Deputy Ciso, City Of New York And Head Of Threat Management For Nyc Cyber Command Original Interview, May 4, 2018
Women in Tech
Have questions or need guidance? Let's connect.
Chat with an Expert