Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Instituting transparency in cybersecurity

By Madeline Lauver
People at a desk coding
November 12, 2021

Transparency across the cyber community can be a benefit to all organizations looking to improve their cybersecurity practices, according to a recent panel of Intel security leaders. As organizations look to connect previously siloed internal departments, they should also consider reaching outside of their business to best secure their technology.

Suzy Greenberg, Vice President of Communications and Incident Response moderated a conversation about resilience and prevention in cybersecurity between Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel's Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy.

Proactive and reactive approaches to transparency

Transparency involves bringing siloed sections of the security industry together for the larger goal of securing technology. Noble noted that bringing security researchers from all sides of the cyber community into the conversation can offer new perspectives on vulnerabilities. She expanded, "When I say security researchers, I don't just mean professional security researchers... [I mean] all the way to hackers in questionable places, doing questionable things. I don't care what someone's motivation is, I care about the technology and securing the technology."

When it comes to transparency, implementing vulnerability disclosure and bug bounty programs is a helpful starting point for cybersecurity teams. Jauregui highlighted the cultural shift that these programs bring about, saying, "We've changed from 'You hacked me — you're going to jail!' to 'You hacked me — let's work together, I will hire you." She says this outreach to cyber experts on all sides of the community leads to tighter defense for organizations.

Elazari underlined the uptick in attention on transparency and collaboration from policymakers around the globe. "This concept of being able to receive reports from external researchers and handling it internally... is a fundamental security capability." She noted that the fear of legal risk prevents cooperation in vulnerability disclosures and bug bounty programs, but this risk perception is rapidly shifting. The recent increase in federal cybersecurity policy may have an encouraging effect on organizations and individuals who were previously reluctant to disclose known vulnerabilities.

Foregrounding inclusion in cybersecurity

Another area where transparency can benefit the cybersecurity industry is in gender parity. Elazari, Greenberg, Jauregui and Noble all touched on inclusion and diversity in the cybersecurity field, in which women only make up 24% of the workforce.

Shifting the narrative around cybersecurity as a purely technical field could make the industry most enticing to women, according to Jauregui. Speaking from her experience as an innovator in using a system's physical properties against itself, she said, "If you are a creative person, if you like arts and crafts, if you're good at attention to detail, which I think a lot of women are, then maybe you'd like hardware security, and you haven't even thought about it."

The panelists also discussed the concepts of mentorship and sponsorship. While all panelists had encouraging mentors of different genders, they also underlined the importance of sponsoring women in cybersecurity. According to Greenberg, sponsorship is "advocating for someone when they're not in the room.... If there's a discussion around capabilities, opportunities, [then] there's someone in the room that is speaking on your behalf when you're not there to advocate for you." The shift from mentorship to sponsorship can create a generation of cyber professionals that are empowered as leaders, not only mentees.

The advocacy involved in sponsorship can be even more effective at an organizational level, according to Elazari. From setting inclusion quotas to promote diverse perspectives within an organization to ensuring fair salaries and opportunities for women on an institutional level, enterprise organizations can ingrain inclusion into workplace culture.

KEYWORDS: bug bounty cyber security careers gender pay gap resiliency vulnerability assessment women in cyber security Women in Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Classroom with desks and chairs

School’s Out, But Security’s Not: Preparing for K-12 Summertime Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Zongo

    Phillimon Zongo - Top Cybersecurity Leaders 2023

    See More
  • Nigro

    Pam Nigro - Top Cybersecurity Leaders 2023

    See More
  • Edgar

    James Edgar - Top Cybersecurity Leaders 2023

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing