SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

GISEC Global celebrates women in cybersecurity ahead of annual exhibition

13 Mar 2024

GISEC Global celebrates women in cybersecurity ahead of annual exhibition
Contact company
Contact Dubai World Trade Centre (DWTC)
icon Add as a preferred source Download PDF version
Related Links
  • What trends are driving growth in security in 2024?
  • Has convergence been achieved in security? Why or why not?

As the Middle East’s largest and most impactful cybersecurity event, GISEC Global continues to provide a solid platform and expand the opportunities for women in the field, fuelling the growth of a diverse industry set to transform the world’s digital behaviours. 

This International Women’s Day, GISEC Global 2024 is spotlighting some of the most influential women in cybersecurity who will take centrestage at the Inspire conference, the most awaited annual programme gathering female pioneers and industry experts, during the three-day cybersecurity showcase from 23-25 April 2024 at the Dubai World Trade Centre. 

Women in cybersecurity

As pioneers forging a complex and dynamic career path, seasoned security architect Alina Tan, esteemed cybersecurity advisor Judy Ngure, and cybersecurity influential digital creator Caitlin Sarian are among the headliners and stand as powerful symbols of female perseverance, talent, and advocacy. 

Their unique contributions to the cybersecurity space have seen ground-breaking impact across the automotive industry, corporate landscape, and social media while collectively, they continue to expand the industry’s understanding of inclusivity and the subsequent potential for even greater innovation. 

women in cybersecurity

From motorsport aspirations to a cybersecurity career

A prominent presence in Singapore’s automotive cybersecurity industry and one of the Top 30 Women in Security in ASEAN – Alina Tan is a powerful representation of female success in a largely male-dominated field. 

She spearheads the Singapore Chapter of the Automotive Security Research Group, a global non-profit

Her passion for cybersecurity stemmed from a personal interest in motorsport, which saw her leverage the synergy between the two to establish a specialised interest group, Car Security Quarter, dedicated to automotive security within her local community. She also spearheads the Singapore Chapter of the Automotive Security Research Group, a global non-profit that promotes knowledge sharing and the development of security solutions. 

Representation and visibility

“I firmly believe in the power of representation and visibility,” said Tan. “Through my experiences, insights, and accomplishments, I aim to demonstrate that women can excel in cybersecurity and thrive in diverse roles within the industry."

"Notable initiatives in the Middle East, such as GISEC Global, feature dedicated stages for Women in Cybersecurity, providing a large-scale platform to showcase talent and inspire a new generation of women in STEM (Science, Technology, Engineering, and Mathematics).” 

Pioneering female figures to take the GISEC Global stage 

Judy Ngure

Ngure aims to celebrate women in the field, demonstrate their value, and inspire other women

Tan will be joined in the Inspire conference at GISEC Global 2024 by Judy Ngure, the founder and CEO of Bug Bounty Box, a platform to help security pioneers manage vulnerabilities. A cybersecurity practitioner for over five years, she has sat on various advisory boards across Africa, supporting organisations in furthering diversity in the cybersecurity field. 

Ngure also co-authored a book titled “African Women in Security: Remarkable Women Moving Cybersecurity in Africa”, which aims to celebrate women in the field, demonstrate their value, and inspire other women to enter the industry. 

Caitlin Sarian

Caitlin Sarian, also known as Cybersecurity Girl, is a dominant cybersecurity influencer with a comprehensive career history – including a decade of consulting experience at the likes of EY and a previous role at TikTok’s Global Cybersecurity Advocacy and Culture team. 

As well as attending the Women in Cybersecurity Roundtable, Caitlin will be pioneering a talk titled ‘The flawed path: debunking the efficacy of current cybersecurity training approaches and how we can improve our future,’ in which she hopes to relay the urgent need to overhaul outdated education methods in favour of training strategies that prioritise real-world application and critical thinking. 

The challenge: women are underrepresented and overlooked  

A lack of inclusive programmes and opportunities often results in feelings of being side-lined

Tan, Ngure, and Sarian agree that for many young women, there may be a sense of not receiving the support, recognition, and validation they deserve for their contributions to cybersecurity.

A lack of inclusive programmes and opportunities for professional growth often results in feelings of being side-lined, which can dampen enthusiasm for pursuing a career in the industry. 

Lack of understanding

An especially significant barrier to upskilling women in cybersecurity is a pervasive lack of understanding of what the field entails. While many assume it is strictly about coding, it has proven to be a multifaceted profession that requires a variety of skills from analytical expertise and problem-solving to communication and creativity.  

An overwhelming number of available boot camps and online courses can also make it difficult for beginners to start, with the information overload often leading to confusion and discouragement before women have even stepped foot into the industry. 

Upskilling women

“The biggest challenge is getting women excited about technical topics in cybersecurity because it looks like a very male-dominated environment which it is,” said Ngure.

“The other key challenge is retaining women in the cybersecurity field; I have seen many women move from technical cyber roles to non-technical jobs. I do encourage women to upskill compared to moving because we need more women active in the industry’s technical leadership positions.” 

Increased female participation

Powerful Women in Cybersecurity

Sarian agreed, “Increased female participation in cybersecurity is not just a matter of equity, it’s a strategic necessity. The field of cybersecurity benefits immensely from diversity, as it brings different perspectives, ideas, and approaches to problem-solving. With their unique experiences and viewpoints, women can drive innovation and enhance the effectiveness of cybersecurity measures.” 

She continued, “As the industry becomes more inclusive, we can expect a more holistic approach to security challenges, one that has the potential to result in more robust and comprehensive security strategies that strengthen our defence against cyber threats.” 

The solution: awareness, accessibility, and advocacy  

Enterprises can adjust their recruitment and hiring processes to eliminate any unconscious biases

Addressing these challenges can be achieved through a variety of avenues, largely led by governments and enterprises, to create more opportunities for women in tech, cybersecurity, and defence.  

On a corporate level, enterprises can adjust their recruitment and hiring processes to eliminate any unconscious biases, as well as partner with female-focused organisations to support targeted outreach efforts.  

Training and development

Mentorship and development are also essential to ensure that women are receiving the senior support they need and are positioned to undertake ongoing training and development to fuel their career growth. 

Awareness and advocacy remain top-of-mind and play a crucial role in championing female role models in the industry, highlighting their achievements and contributions to the wider cybersecurity community. Awards ceremonies, media campaigns, and conferences can stir conversations around female success and entrepreneurship in the industry. 

Policy and legislation

At a higher level, policy and legislation can better equip businesses to deliver equal pay and opportunity

Governments can further drive accessibility through education and training initiatives that encourage girls to pursue STEM education and careers, along with dedicated scholarships and grants to fund their academic journey. 

At a higher level, policy and legislation can better equip businesses to deliver equal pay and opportunity as well as flexible working policies to attract and retain top female talent while cross-industry partnerships serve as a powerful tool for collaboration to foster a more diverse and inclusive tech workforce. 

The Middle East’s most impactful cybersecurity event 

GISEC Global 2024 will welcome over 20,000 visitors, 750 of the world’s foremost exhibiting companies such as Huawei, Honeywell, du, Cloudflare, and Qualys, 350-plus pioneering cybersecurity speakers, and over 1,000 ethical hackers from more than 130 countries in the 13th edition of the annual three-day of the Middle East’s largest and most impactful cybersecurity event.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Video analytics
  • Institute security
  • Security service
  • Museum security
  • Green security
  • Integration software
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Network Video Recorders
  • Digital Video Recorders
  • Home automation
  • Artificial intelligence (AI)
  • Related links
  • GISEC Global 2024
  • Networkable Access control readers
  • Dual Technology Detectors Intruder detectors
  • Infrared CCTV cameras
  • Bar Code Access control readers
  • Biometric Access control software
  • Biometric Access control systems & kits
  • Infrared IP cameras
  • Standalone Access control systems & kits
  • Access Control Software Access control software
  • Magnetic Stripe Access control cards/ tags/ fobs
  • ANPR Software CCTV software
  • Passive Infrared detector Video motion detectors
  • Card Access control cards/ tags/ fobs
  • Megapixel IP cameras
  • Control Software CCTV software
  • Intelligent motion detection Video motion detectors
  • PC-based Access control readers
  • Quad Technology Detectors Intruder detectors
  • Pan Tilt CCTV cameras
  • Biometric Access control readers
  • Networked Access control systems & kits
  • Card Access control software
  • Card Swipe Access control systems & kits
  • Network IP cameras
  • Standalone Access control readers
  • PCB CCTV cameras
  • Card Swipe Access control readers
  • Standalone / Networked Access control systems & kits
  • Contact Access control software
  • Proximity Access control cards/ tags/ fobs
  • Fob Access control cards/ tags/ fobs
  • Detection Software CCTV software
  • Thermal CCTV cameras
  • PC-based Access control systems & kits
  • Smart Card Access control systems & kits
  • Drawing Software CCTV software
  • Mifare Access control software
  • PTZ IP cameras
  • Standalone / Networkable Access control readers
  • Contact Access control readers
  • Smart Card Access control cards/ tags/ fobs
  • Tag Access control cards/ tags/ fobs
  • Wiegand Access control cards/ tags/ fobs
  • Wireless CCTV cameras
  • Infrared Access control readers
  • Wiegand Access control systems & kits
  • Proximity Access control software
  • IP Surveillance Software CCTV software
  • Thermal IP cameras
  • Magnetic Stripe Access control readers
  • Central Monitoring Option Access control software
  • Management Software CCTV software
  • Contact Access control systems & kits
  • Pinhole CCTV cameras
  • Smart Card Access control software
  • Mifare Access control readers
  • Centrally managed access solution Access control software
  • Infrared Access control systems & kits
  • Proximity Access control readers
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • RFID Access control readers
  • Door Monitoring Option Access control software
  • Smart Card Access control readers
  • Transmission Software CCTV software
  • DVR Interface Access control software
  • Face Recognition Software Access control software
  • High Level Interface Access control software
  • ID Badging Software License Access control software
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control systems & kits
  • Access control software
  • Intruder detectors
  • IP cameras
  • Access control readers
  • Electronic locking devices
  • Access control cards/ tags/ fobs
  • Electronic keypads
  • Video motion detectors
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Events news
About this page

"Explore GISEC Global 2024, the Middle East's leading cybersecurity event, spotlighting pivotal women in the field. Join industry giants at this comprehensive platform for diversity and cybersecurity advancements."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec