top of page


Part II

PART II - 11 Nov 2021




Welcome and introduction by the Women in Cyber Team.


Lisa Schauss



Training and attracting cyber minds

In a world where cyber talents are scarce, how can we position ourselves as an interesting and exciting employer and what advantages or challenges does a conscript force bring with it?

Petra Marty



Working on social challenges in the cyber sector

Children grow up in a world where surfing the internet is a normal part of their daily lives. The virtual world holds dangers, but it can also open up many opportunities for young users. Protection, empowerment and participation are essential to unlock these opportunities. Strengthening their mental health is also part of this.

This issue is of particular concern to school authorities, teachers and parents. How can the correct use of the internet be integrated into teaching in a sustainable way? How can awareness be created? Which points of contact can help? 

Together we are stronger. Netpathie brings all actors together, coordinates cooperation, supports school authorities, teachers, parents and children to sustainably anchor the topic in the classroom – both on site or interactively, and with suitable teaching materials.

​This presentation will introduce the Netpathie project, which is in development. In addition, we will show that many cyber career opportunities exist outside of companies that focus on this topic.


Monique Morrow

Syniverse Technologies


Why Trust is Foundational in Our Cybersecurity World

We do not have to look far in history or in the present to explore the abuses technology abuses and the demand for ethics. We have all seen this picture before and know very well that trust is foundational to the way we communicate and operate socially. When self -governance is no longer viable due to some form of greed, who decides and how? Have we become immune to data breaches and the misuse of our own data?
There is a correlation between privacy, data abuse and you owning your data. Imagine that possibility! In the end, when trust is broken, we are broken and the call to action is to collectively fix it. The promise of Self Sovereign Identity or SSI may be a step forward. It is not too late.
There are three themes I will discuss in this talk:
1. Patterns of Technological Abuse
2. Why They Matter and the promise of Self Sovereign Identity

Carola Hug

Exeon Analytics



Detecting Hidden Cyber Threats (TECH DEEP DIVE)

A talk with various examples on cyber attacks which haven’t been detected in due time and an illustration how machine learning and big data could help find those attacks. Followed by a brief live hacking.


Maryam Zayat



Policing in a digital world

The word ‘cyber’ is everywhere these days. There’s ‘cyber security’, ‘cyber defence’ or ‘cyber crime’ – they all mean something different and present different challenges – also in policing.

Just as we move about in the digital world in our private lives, so do criminals. And that’s why law enforcement must do so too. This presentation will address some of the current threats and challenges posed by digital crime, how to combat digital crime and illustrate these aspects with a concrete example.

Janet T. Phan

Microsoft / Thriving Elements



Why mentoring is important for women in cyber? 7 key steps to getting and maintaining a Mentor

Why is mentoring imperative and especially for women in Cyber Security? A tried and proven method to help you to find a mentor that works for you, how to get started, and solidify the relationship that can change your life just like the mentors who changed Janet’s life.

Learn about how Janet Phan, raised by refugee parents from Vietnam, lived out of her car, and became the first in her family to go to college. She will share with you examples of how she used her tenacity and leveraged mentoring to land a career in global technology consulting among the breathtaking Swiss Alps while managing a STEM mentoring program with a mission to create access and opportunities for underrepresented girls. Janet will provide you a framework that includes practical tips on finding and cultivating a meaningful, quality mentoring relationship to navigate your cyber security career.


Sandra Tobler


Lajla Aganovic


Carola Hug


Thomas Holderegger



Collaborative Innovation Between Startups and Corporates in the Cyber Space

Kathryn Hedley



PinePhone Forensics (TECH DEEP DIVE)

The PinePhone is one of the first true Linux-based smartphone projects that has released mobile devices, available to the general public, with a smartphone-specific variant of Linux pre-flashed onto the device. These devices can be used out of the box, or can be re-flashed with other Linux variants. Available devices are still very much in the development phase, which brings the added fun of the occasional device or application crash, and some hardware not being supported at all by some Linux variants. However, there is the prospect of such devices becoming more common in the future, and it's fun to see what data may be stored on a device, where, and how we can acquire it, to work out how it may be useful to a digital forensic investigation if one of these devices was seized as part of a case. Kathryn will walk through her research so far, explain how to acquire data from a device and where some data of interest may be stored.

Chelsey Slack



Defending cyberspace: a perspective from NATO

In my remarks, I’ll highlight some of the recent thinking from a security and defence perspective on cyberspace, including how countries in the NATO Alliance are working together to enhance their resilience to cyber threats, collaborate with partners, leverage technology, and promote greater stability in cyberspace.


Part I

PART I - 10 June 2021




Welcome and introduction by the Women in Cyber Team.


Monica Ratte

National Cyber Security Center (NCSC)


The (real) skills to have to work in IT security

When you start to work in IT security you think that the most needed competences are technical skills: do I know this protocol, does it have known vulnerabilities, do I understand how they work, which are the mitigation possibilities,… And then, reality strikes! In this talk, I will present you my journey towards my current role as Federal Commissioner for IT Security and the competences that are important today to work in IT security.

In particular, I will share with you many reality checks that I had since starting working at the Federal government eight years ago. And for those of you without an IT background, don’t worry, you will see that for you too there are exciting opportunities in the IT security field.

Laura Mati, Ramona Traber, Ursina Livers



How to help businesses becoming cyber resilient – a cyber strategy toolkit

TBD Ever wondered how to build a cyber security strategy from scratch? Want to see how it is done? Join us to discover the essential ingredients and phases to build up a cyber security strategy. We will provide you with some theory and run you through a real-life, practical case we solved with one of our clients. At the end of this brief session you will have a better understanding of how things like threat landscape, talent, capabilities, etc. all come together and play an essential role in shaping a cyber strategy to keep a company more secure and make it more cyber resilient.


Dr. Myriam Dunn Cavelty

Center for Security Studies (ETH)


Cyber Security Politics: successfully combining technical and political knowledge

The great thing about cyber security is its interdisciplinarity: there are countless areas in academia, the private and the public sector in which expertise at the intersection between cyber and another issue is both needed and valued. However, the hard thing about cyber security is also its interdisciplinarity: how much do we need to know about technologies, how much about other issue areas? Myriam Dunn Cavelty will share her experience from twenty years of research, teaching and policy consulting, highlighting how the field of cyber security has changed over the years, and where the main opportunities and challenges lie now and in the future.

Barbara Flaad




Cybersecurity and Mindfulness

You will get a short introduction into mindfulness and how meditation will help you stay safe and sane in the crazy cybersecurity world. Mindfulness meditation can be described as a practice of paying attention in the present moment. Being aware of the present means also being more aware of possible cyber-security threats.

Criminal hackers count on us not paying attention. Phishing mails, fraudulent web shops or documents are built as such that they seem legit on a first glimpse. A closer look would reveal the signs of fraud, but we're busy and distracted most of the time. Paying attention to the moment and what we do, would prevent many of those attacks. Mindfulness not only helps in the fight against cybersecurity. It is also a method for personal stress reduction and improved physical well-being.


Dr. Maya Bundt

Swiss Re

Simone Frömming



50 Shades of Cyber

There is no one way to make a difference in cyber space. In fact, there are thousands. Roles in cyber (-risk management, -security, -defense, -policy development, -research, -technology, …) require diverse skills and experiences. In order to bring this diversity to the forefront, we are bringing 5 real examples, portraits of 5 real women, who have made their way into a cyber role within the world's leading technology company and the world's leading reinsurer. Diversity is powerful!

Susanne Emonet




IoT Security  – why YOU should care; A few delightful examples that will change your view on IoT 

IoT Security - why YOU should care? The answer is fabulously simple: Because you are directly affected by it. At work, at home, traveling…

So I would love to invite you for a few minutes to join me in my world of IoT security, share some insightful examples from different environments and make YOU care…and hopefully discover how YOU can make a difference to make our world a little more secure and sustainable.


Myla Pilao

Trend Micro


CYBERSECURITY can save lives too -  Protecting the Connected

Today, we are up against faceless, nameless adversaries who have the capacity to destabilize organization’s cyber security but we also face a decade long problem of cyber skills talent shortage. If remain unsolved this renders organizations big or small unprepared to win this cyber challenge. 

So I begin to question whether what we have today is a skills gap problem or we have underrepresentation problem. Today’s cyber security industry has a gender problem a huge contributor of that is the absence of women in this in this field. Together, let us examine how we can humanize cyber security and understand the power it has to create a world that this not just bigger, better but safer . In this session we will learn :

  • Culture of Inclusion – Discover your untapped potentials and learn what skills you need to develop as cyber professional  to navigate in today’s and tomorrow’s cyber security workforce dynamics 

  • Diversity is  Necessity  -  Understand how diversity is crucial to the future of cybersecurity and what women can bring to the equation to recognize and  endorse the notion that shifting gender norms benefits everyone.

  • Changing Face of Cyber Security -  Connectivity has the power to enrich industries, economies and companies but it is not without risks as digital threats are multiplying. Learn exciting security research projects and how you can be part of the workforce that will shift the gears.

Elcin Biren



Cyber Security in the DNA of Women

The shortage of Cybersecurity talent is a pressing issue, with a demand remarkably bigger than the supply. The lack of diversity actually makes the process of security an organization harder than it should be.

To encourage more women to get into the field of Cyber-Security as Elcin believes women are hard-coded by birth with the necessary skill sets - making them great Cyber Security executives. The challenge is to reveal their inner natural-born security skills.
In this session, she talks about the workforce shortage in the cybersecurity industry, her personal journey in the field, and how women can stay engaged, and, therefore, get hired.


Viola Amherd

Federal Councilor & Head of the Department of Defence



Ueli Amsler, CISO

Ruth van der Zypen-Millard, Public Affairs and Training manager


Why the Swiss Armed Forces play an important role in cyberspace

(Video message)

Did you know that ICT and cyber play a central role in the Swiss Armed Forces? Did you also know that the Swiss Armed Forces have their own robust and independent connection network that is being continuously expanded? In her video message, Viola Amherd tells us why the army needs this independent network, why today an army remains a necessity and how Switzerland's neutrality is maintained in cyberspace as well. In order to counter today's diffuse threat scenarios, the Swiss Armed Forces need capabilities that are coordinated and perfectly harmonized with each other.

Women in the cyber domain are a personal concern for Viola Amherd. In fact, security is also female and the potential of women in ICT is enormous. The Swiss Armed Forces are always on the lookout for the best cyber talents, either in uniform or in civilian clothes.


bottom of page