Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Instituting transparency in cybersecurity

By Madeline Lauver
People at a desk coding
November 12, 2021

Transparency across the cyber community can be a benefit to all organizations looking to improve their cybersecurity practices, according to a recent panel of Intel security leaders. As organizations look to connect previously siloed internal departments, they should also consider reaching outside of their business to best secure their technology.

Suzy Greenberg, Vice President of Communications and Incident Response moderated a conversation about resilience and prevention in cybersecurity between Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel's Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy.

Proactive and reactive approaches to transparency

Transparency involves bringing siloed sections of the security industry together for the larger goal of securing technology. Noble noted that bringing security researchers from all sides of the cyber community into the conversation can offer new perspectives on vulnerabilities. She expanded, "When I say security researchers, I don't just mean professional security researchers... [I mean] all the way to hackers in questionable places, doing questionable things. I don't care what someone's motivation is, I care about the technology and securing the technology."

When it comes to transparency, implementing vulnerability disclosure and bug bounty programs is a helpful starting point for cybersecurity teams. Jauregui highlighted the cultural shift that these programs bring about, saying, "We've changed from 'You hacked me — you're going to jail!' to 'You hacked me — let's work together, I will hire you." She says this outreach to cyber experts on all sides of the community leads to tighter defense for organizations.

Elazari underlined the uptick in attention on transparency and collaboration from policymakers around the globe. "This concept of being able to receive reports from external researchers and handling it internally... is a fundamental security capability." She noted that the fear of legal risk prevents cooperation in vulnerability disclosures and bug bounty programs, but this risk perception is rapidly shifting. The recent increase in federal cybersecurity policy may have an encouraging effect on organizations and individuals who were previously reluctant to disclose known vulnerabilities.

Foregrounding inclusion in cybersecurity

Another area where transparency can benefit the cybersecurity industry is in gender parity. Elazari, Greenberg, Jauregui and Noble all touched on inclusion and diversity in the cybersecurity field, in which women only make up 24% of the workforce.

Shifting the narrative around cybersecurity as a purely technical field could make the industry most enticing to women, according to Jauregui. Speaking from her experience as an innovator in using a system's physical properties against itself, she said, "If you are a creative person, if you like arts and crafts, if you're good at attention to detail, which I think a lot of women are, then maybe you'd like hardware security, and you haven't even thought about it."

The panelists also discussed the concepts of mentorship and sponsorship. While all panelists had encouraging mentors of different genders, they also underlined the importance of sponsoring women in cybersecurity. According to Greenberg, sponsorship is "advocating for someone when they're not in the room.... If there's a discussion around capabilities, opportunities, [then] there's someone in the room that is speaking on your behalf when you're not there to advocate for you." The shift from mentorship to sponsorship can create a generation of cyber professionals that are empowered as leaders, not only mentees.

The advocacy involved in sponsorship can be even more effective at an organizational level, according to Elazari. From setting inclusion quotas to promote diverse perspectives within an organization to ensuring fair salaries and opportunities for women on an institutional level, enterprise organizations can ingrain inclusion into workplace culture.

KEYWORDS: bug bounty cyber security careers gender pay gap resiliency vulnerability assessment women in cyber security Women in Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Zongo

    Phillimon Zongo - Top Cybersecurity Leaders 2023

    See More
  • Nigro

    Pam Nigro - Top Cybersecurity Leaders 2023

    See More
  • Holden

    Alex Holden - Top Cybersecurity Leaders 2023

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing