Elizabeth (Liz) is Chief of Staff at SCYTHE where she serves as a strategic advisor for the CEO and leadership team, building and maintaining cross-department relationships, crafting external initiatives, and driving day-to-day projects and tasks. She brings to SCYTHE over a decade of legal, policy, and business experience within the information security field. Prior to joining SCYTHE she served as VP Operations and Strategy for a third-party risk threat intelligence platform startup, scaling the company from 5 to 25+ employees and successfully completing a $10m Series A funding round. Previously she was the Senior Assistant City Attorney with the City of Atlanta responsible for advising Hartsfield-Jackson Atlanta International Airport on technology policy and projects – including the airport’s “first of its kind” safety risk assessment and integration of drones into airfield operations at the “World’s Busiest Airport.” She also served on the immediate incident response team for the City of Atlanta’s ransomware incident.
The former host of the “Buzz Off with Lawyer Liz” tech-focused radio show and podcast, Liz is a frequent podcast guest and speaker on risk mitigation and regulatory policy on IoT, drone, and aviation cybersecurity issues at conferences including SXSW, ShmooCon, Hack the Capitol, the Talos Threat Research Summit (Cisco Live!), and the GSMA Global Innovation Forum. She serves on various national technology and information security regulatory working groups, including the Business Executives for National Security’s Tech and Innovation Council, and is a mentor for startup accelerators. She received her J.D. from Georgia State University College of Law and her B.A. from Virginia Tech.
Dodging Risk Rabbit Holes & Red Herrings
In an evolving risk landscape, it’s easy to become distracted by the flood of incoming information and security alerts. With tightening resources, from teams working remotely to shrinking budgets, leveraging the odds via threat intelligence to mitigate risks becomes key. We will highlight how to use threat intelligence as a force-multiplier to bridge the business risk and security risk divide.