Cybersecurity Pathways to Training, Talent & Diversity (no design)

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.4.6″ background_image=”https://cyberwarrior.com/wp-content/uploads/2020/05/banner-main.jpg” background_size=”cover” custom_padding=”55px||89px||false|false” custom_padding_tablet=”” custom_padding_phone=”||||false|false” scroll_fade=”0|55|55|100|0|100|100″][et_pb_row column_structure=”3_5,2_5″ disabled_on=”on|on|off” module_class=”home-banner” _builder_version=”4.4.6″ custom_padding=”0px||0px|||” scroll_fade_enable=”on” scroll_fade=”0|67|67|100|0|100|100″ custom_css_main_element=”display:flex;||align-items:center;”][et_pb_column type=”3_5″ _builder_version=”4.4.6″][et_pb_text module_class=”home-banner” _builder_version=”4.4.6″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”21px” header_font=”|700||on|||||” header_text_color=”#ffffff” header_line_height=”40px” custom_padding=”||0px|||” header_font_size_tablet=”25px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” header_line_height_tablet=”33px” header_line_height_phone=”30px” header_line_height_last_edited=”on|tablet” text_orientation_tablet=”center” text_orientation_phone=”” text_orientation_last_edited=”on|tablet”]

CYBERSECURITY PATHWAYS TO TRAINING, TALENT & DIVERSITY

[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.4.6″][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/06/10-steps-IAM-program.png” title_text=”10-steps-IAM-program” align=”right” align_tablet=”center” align_phone=”” align_last_edited=”on|phone” admin_label=”Home Page CyberWarrior ” _builder_version=”4.4.6″][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row disabled_on=”off|off|on” module_class=”home-banner” _builder_version=”4.4.6″ custom_padding=”0px||0px|||” scroll_fade_enable=”on” scroll_fade=”0|67|67|100|0|100|100″ custom_css_main_element=”display:flex;||align-items:center;”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/06/10-steps-IAM-program.png” title_text=”10-steps-IAM-program” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|phone” admin_label=”Home Page CyberWarrior ” _builder_version=”4.4.6″][/et_pb_image][et_pb_text module_class=”home-banner” _builder_version=”4.4.6″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”21px” header_font=”|700||on|||||” header_text_color=”#ffffff” header_line_height=”40px” header_2_text_color=”#ffffff” header_font_size_tablet=”25px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” header_line_height_tablet=”33px” header_line_height_phone=”30px” header_line_height_last_edited=”on|tablet” text_orientation_tablet=”center” text_orientation_phone=”” text_orientation_last_edited=”on|tablet”]

CYBERSECURITY PATHWAYS TO TRAINING, TALENT & DIVERSITY

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px||0px||false|false” collapsed=”off”][et_pb_row _builder_version=”4.4.6″ custom_padding=”0px||0px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.6″ text_orientation=”center”]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”33px||62px||false|false” animation_style=”fade” animation_duration=”2000ms” animation_delay=”450ms” animation_speed_curve=”ease” scroll_fade=”0|76|76|100|0|100|100″ motion_trigger_start=”top” collapsed=”off”][et_pb_row _builder_version=”4.4.6″ max_width=”1080px” custom_padding=”35px|||||” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_color=”rgba(236,66,62,0.19)”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.6″ text_line_height=”2.1em” header_2_text_color=”#ec423e” header_2_font_size=”31px” header_2_line_height=”1.3em”]

Wednesday, August 19th, 2020 @ 2:00pm EDT

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row module_class=”pages-title-main” _builder_version=”4.4.6″ custom_margin=”40px||||false|false”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/05/title-line.png” title_text=”title-line” align=”center” _builder_version=”4.4.6″][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row module_class=”cyberwarrior-box” _builder_version=”4.4.6″ custom_padding=”2px||40px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.6″ text_line_height=”21px” header_4_font=”|600|||||||” header_4_text_align=”center” header_4_text_color=”#000000″ header_4_font_size=”25px” text_orientation=”center” width=”100%” hover_enabled=”0″ header_4_font_size_tablet=”” header_4_font_size_phone=”20px” header_4_font_size_last_edited=”on|phone” header_4_text_color__hover_enabled=”off|hover” content_last_edited=”on|phone” content_phone=”

Diversity in the workplace has come to a head in the past few months. Companies want to know what solutions exist and what best practices other companies have implemented. Bootcamp training programs? Apprenticeship models? What methods have companies used to diversify their workforce? Companies across all industries are scrambling to fill cybersecurity job openings with no clear solution.   

Motivated candidates, both employed and underemployed, want to know the proven strategies to enter the Cybersecurity industry and grow within it.

 

  • What are key tips that you received early in your career that have helped you be successful?
  • The business of Cybersecurity and how it aligns with advancing business objectives
  • How do I get started? What are the pathways? How do you connect and grow within the industry? 
  • What are some of the key characteristics that a candidate can display to get your attention in an interview?

Our panel of industry executives will guide us through these important and timely questions.

“]

Diversity in the workplace has come to a head in the past few months. Companies want to know what solutions exist and what best practices other companies have implemented. Bootcamp training programs? Apprenticeship models? What methods have companies used to diversify their workforce? Companies across all industries are scrambling to fill cybersecurity job openings with no clear solution.   

Motivated candidates, both employed and underemployed, want to know the proven strategies to enter the Cybersecurity industry and grow within it.

 

  • What are key tips that you received early in your career that have helped you be successful?
  • The business of Cybersecurity and how it aligns with advancing business objectives
  • How do I get started? What are the pathways? How do you connect and grow within the industry? 
  • What are some of the key characteristics that a candidate can display to get your attention in an interview?

Our panel of industry executives will guide us through these important and timely questions.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.4.6″][et_pb_column type=”1_3″ _builder_version=”4.4.6″][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/07/Reinier-Moquete.jpg” title_text=”Reinier Moquete” align=”center” _builder_version=”4.4.6″ width=”200px” border_radii=”on|50%|50%|50%|50%” border_width_all=”1px” border_color_all=”#efefef”][/et_pb_image][et_pb_text _builder_version=”4.4.6″ text_orientation=”center”]

Reinier Moquete
Moderator
Founder & CEO at CyberWarrior Academy

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.4.6″][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/07/Global-Head-of-Resiliency-for-GTI-Global-Technology-Infrastructure-at-JPMC.jpg” title_text=”Global Head of Resiliency for GTI Global Technology Infrastructure at JPMC” align=”center” _builder_version=”4.4.6″ width=”200px” border_radii=”on|50%|50%|50%|50%” border_width_all=”1px” border_color_all=”#efefef”][/et_pb_image][et_pb_text _builder_version=”4.4.6″ text_orientation=”center”]

Jason Rueda
Panelist
Global Head of Resiliency for GTI Global Technology Infrastructure at JP Morgan Chase 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.4.6″][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/07/Kristin-Nichols-Program-Manager.jpg” title_text=”Kristin Nichols, Program Manager” align=”center” _builder_version=”4.4.6″ width=”200px” border_radii=”on|50%|50%|50%|50%” border_width_all=”1px” border_color_all=”#efefef”][/et_pb_image][et_pb_text _builder_version=”4.4.6″ text_orientation=”center”]

Kristin Nichols
Panelist
Program Manager for Talent Acquisition/Diversity, Equity & Belonging at Ultimate Software

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″][et_pb_column type=”1_2″ _builder_version=”4.4.6″ custom_css_main_element=”display:flex;||flex-direction:column;||align-items:center;”][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/07/Elizabeth-Agosto.jpg” title_text=”Elizabeth Agosto” align=”center” _builder_version=”4.4.6″ width=”200px” border_radii=”on|50%|50%|50%|50%” border_width_all=”1px” border_color_all=”#efefef”][/et_pb_image][et_pb_text _builder_version=”4.4.6″ text_orientation=”center” width=”300px” custom_margin=”0px||0px||false|false” custom_padding=”0px||0px||false|false”]

Elizabeth Agosto
Panelist
Global COO for Information Security Division at BNY Mellon

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″ custom_css_main_element=”display:flex;||flex-direction:column;||align-items:center;”][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/05/Leadership-Team-3.jpg” title_text=”Leadership Team-3″ align=”center” _builder_version=”4.4.6″ width=”200px” border_radii=”on|50%|50%|50%|50%” border_width_all=”1px” border_color_all=”#efefef”][/et_pb_image][et_pb_text _builder_version=”4.4.6″ text_orientation=”center” width=”300px” custom_margin=”0px||0px||false|false” custom_padding=”0px||0px||false|false”]

Sue Bergamo
Panelist
Chief Information & Chief Security Officer at Episerver

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”33px||62px||false|false” animation_style=”fade” animation_duration=”2000ms” animation_delay=”450ms” animation_speed_curve=”ease” scroll_fade=”0|76|76|100|0|100|100″ motion_trigger_start=”top” collapsed=”off”][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text module_id=”trainning-program” _builder_version=”4.4.6″ header_3_font=”|700||on|||||” header_3_text_align=”center” header_3_text_color=”#000000″ header_3_font_size=”35px” header_6_font=”|600|||||||” header_6_text_align=”center” header_6_text_color=”#777777″ header_6_font_size=”16px” custom_margin=”||3px||false|false” header_3_font_size_tablet=”25px” header_3_font_size_phone=”20px” header_3_font_size_last_edited=”on|tablet” header_3_line_height_tablet=”” header_3_line_height_phone=”28px” header_3_line_height_last_edited=”on|tablet” header_6_font_size_tablet=”14px” header_6_font_size_phone=”14px” header_6_font_size_last_edited=”on|tablet”]

Join Us!

[/et_pb_text][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/05/title-line.png” title_text=”title-line” align=”center” _builder_version=”4.4.6″][/et_pb_image][et_pb_code _builder_version=”4.4.6″]

[/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_class=”graduates-wrap” _builder_version=”4.4.6″ background_image=”https://cyberwarrior.com/wp-content/uploads/2020/06/graduates-bg.jpg” background_size=”cover” custom_padding=”60px||60px||true|false” global_module=”2933″ locked=”off”][et_pb_row column_structure=”1_3,2_3″ custom_padding_last_edited=”on|tablet” module_class=”graduates-section” _builder_version=”4.4.6″ custom_padding=”50px||50px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”” animation_style=”fade” animation_delay=”200ms”][et_pb_column type=”1_3″ _builder_version=”4.4.6″][et_pb_text module_class=”graduate-video” _builder_version=”4.4.6″ text_font=”|600|||||||” text_text_color=”#000″ text_font_size=”18px” text_line_height=”30px”]

[/et_pb_text][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.4.6″ header_line_height=”36px” header_3_font=”|600|||||||” header_3_text_color=”#0a0000″ header_3_font_size=”25px” header_3_line_height=”32px” custom_margin=”||3px||false|false” custom_padding=”||||false|false” header_line_height_tablet=”” header_line_height_phone=”50px” header_line_height_last_edited=”on|phone” header_3_line_height_tablet=”” header_3_line_height_phone=”” header_3_line_height_last_edited=”on|phone” locked=”off”]

What our graduates are saying

[/et_pb_text][et_pb_image src=”https://cyberwarrior.com/wp-content/uploads/2020/05/title-line.png” title_text=”title-line” module_class=”title-img” _builder_version=”4.4.6″ locked=”off”][/et_pb_image][et_pb_text module_class=”graduates-info” _builder_version=”4.4.6″ header_line_height=”36px” header_3_font=”|600|||||||” header_3_text_color=”#0a0000″ header_3_font_size=”25px” header_3_line_height=”32px” header_4_font=”|600|||||||” header_4_text_color=”#000000″ header_4_font_size=”16px” header_4_line_height=”21px” header_5_font=”|600|||||||” header_5_line_height=”25px” custom_margin=”||||false|false” custom_padding=”||||false|false” header_line_height_tablet=”” header_line_height_phone=”50px” header_line_height_last_edited=”on|phone” header_3_line_height_tablet=”” header_3_line_height_phone=”” header_3_line_height_last_edited=”on|phone” locked=”off”]

CyberWarrior Academy Changes Lives

“I highly recommend CyberWarrior Academy’s security engineering program because it covers an incredible amount of material and the trainer’s knowledge and teaching strategy are excellent. Thanks to CWA, I learned how to address real-world threats and vulnerabilities. I also learned the importance of having a secure IT infrastructure in both personal and work environments

– Rodley Rene

Information Security Engineer,
Partners Healthcare

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]