LEVEL 60 WINNERS
Sivan Tehila, a Cybersecurity expert with over 15 years of experience. Director of Solution Architecture at Perimeter 81, Founder of Cyber Ladies NYC, and Adjunct Professor of Cybersecurity at Yeshiva University. Sivan fulfilled multiple positions during her service in the Israel Defense Forces, including an Intelligence Officer, CISO of Research and Analysis Division, and Head of the Information Security Department of the Intelligence Corps. Sivan was honorably discharged as a Captain. Later, Sivan joined the Israeli defense technology company RAFAEL as an Information Security Officer and a profiler. She then served as a cybersecurity consultant for the Israel Railways. In addition, Sivan runs technical and educational workshops in Cybersecurity, speaks at conferences around the world, and contributes to information and cybersecurity magazines. During the last years, Sivan has dedicated herself to promoting women in Cybersecurity. She Founded Cyber Ladies NYC and developed a unique cybersecurity program for Manhattan High School for girls.
INFOSEC specialist whose qualifications include a Master’s degree in Information Assurance; C|EH, CNDA, ITILV3, Comptia Advanced Security Practitioner, Security+, Network +, MCSA, PALO ALTO (ACE), CloudU designations; and detailed knowledge of security tools, technologies and best practices. Fifteen years of experience in the creation and deployment of solutions protecting networks, identity management, systems and information assets for diverse companies and organizations. Hands-on security experience with the following FISMA C&A processes and supporting tools: System Security Authorization Agreement (SSAA) / System Security Plan (SSP), Concept of Operations (CONOPS), System Rules of Behavior, Security Test and Evaluation (ST&E) from both a documentation (i.e., Security Requirements Tractability Matrix (SRTM) and overall risk assessment plan construction) and a technical (vulnerability scanning and analysis) standpoint, Incident Response, SDLC planning, DIACAP transition, Contingency, Disaster Recovery, and Continuity of Operations (CP/DRP/COOP), Project of Action and Milestones (POA&M), Privacy Impact Assessments, DISA Gold Disk, Nessus, eEye Retina, Host Based Security System (HBSS), Security information and event management (SIEM), log analysis, packet analysis, intrusion detection, Network/application, vulnerability, exploit, penetration testing, pen test tools, Burp Suite, Kali Linux, Metasploit, Forensics, penetration testing, White Hat, ethical hacking, vulnerability assessment.