As security has evolved into a core issue for business and society, the talent shortage persists. Recent studies by the Center for Cyber Safety and Education predicted a shortfall of 1.8 million open and unfilled cybersecurity positions by 2022. Bringing more women into the security industry continues to be a missed opportunity to address the growing skills gap, with women representing only 11 percent of the current global information security workforce.

Help IBM Make a Difference for Women in Cybersecurity

IBM Security is excited to host our second invite-only Women in Cybersecurity Seminar on Friday, August 25, 2017, in Atlanta. We are seeking enthusiastic, engaged and innovative students enrolled in post-secondary institutions who are interested in cybersecurity careers to attend this exclusive event. This event will provide female students the opportunity to engage with IBM role models in cybersecurity and learn more about career paths in the industry.


IBM Security, 6303 Barfield Rd. NE, Sandy Springs, GA 30328-4233


Friday, August 25, 2017 – 12:00 p.m. to 5:00 p.m.

Application Process

We require all applicants to submit a cover letter and resume to [email protected] by August 17, 2017. Acceptance emails will be sent out within two business days.

Space Is Limited – Apply Now!

Please be advised that the information you provide to IBM for the purpose of applying to attend this conference may be used by IBM to consider you for future employment opportunities with us. This information will be kept by IBM for a period of 12 months following the event. Should you wish for IBM not to retain this information following the conference attendance selection, please email [email protected]

More from

The Evolution of Antivirus Software to Face Modern Threats

Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.  Because of the increased threat that modern cyberattacks pose, experts are exploring more elegant ways of keeping data safe from threats.Signature-Based Antivirus SoftwareSignature-based detection is the use of footprints to identify malware. All programs, applications, software and files have a digital footprint. Buried within their code, these digital footprints or signatures are unique to the respective…

How Do Threat Hunters Keep Organizations Safe?

Neil Wyler started his job amid an ongoing cyberattack. As a threat hunter, he helped his client discover that millions of records had been stolen over four months. Even though his client used sophisticated tools, its threat-hunting technology did not detect the attack because the transactions looked normal. But with Wyler’s expertise, he was able to realize that data was leaving the environment as well as entering the system. His efforts saved the company from suffering even more damage and…

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…

Contain Breaches and Gain Visibility With Microsegmentation

Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have especially manifested in more significant security threats to expanding IT attack surfaces. Breach containment is essential, and zero trust security principles can be applied to curtail attacks across IT environments, minimizing business disruption proactively. Microsegmentation has emerged as a viable solution through its continuous visualization of workload and device communications…