O'Reilly logo

Hacking the Hacker by Roger A. Grimes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

38Profile: Jing de Jong‐Chen

As the previous chapter discussed, you cannot obtain real, long‐lasting computer security without policies and strategies. Some of the “invisible” heroes of computer security are the people who drive corporate and global computer security strategies. Jing de Jong‐Chen, Partner and General Manager, Global Security Strategy, Corporate, External and Legal Affairs Division at Microsoft, has devoted her professional life to pushing for better and more global interoperable computer security standards and cyber policy harmonization. She also serves as vice president of the Trusted Computing Group (TCG), a non‐profit, international, industry standards organization focusing on security technology innovations. She is a board advisor of the Executive Women’s Forum, an organization dedicated to promoting women in the security, privacy, and risk management professions. In addition, de Jong‐Chen serves as an advisor to the Digital Futures project of the Woodrow Wilson Center, which champions technology thought leadership to shape public policy development. She received the “Women of Influence Award” from the Executive Women’s Forum in 2014 for her professional contributions to cybersecurity. She holds a master’s degree in business administration and a bachelor of science degree in computer science.

One of the things I noticed right away when I first interviewed her was how thoughtful and complete her answers were. She has spent decades successfully fighting for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required