{"id":19067,"date":"2021-11-10T14:06:07","date_gmt":"2021-11-10T10:06:07","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/community-podcast-wilpf\/19067\/"},"modified":"2021-11-10T14:06:07","modified_gmt":"2021-11-10T10:06:07","slug":"community-podcast-wilpf","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/community-podcast-wilpf\/19067\/","title":{"rendered":"Community Conversations, episode 4"},"content":{"rendered":"<p>Welcome back to the Community Podcasts, a mini-series on the <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=podcast\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky <em>Transatlantic Cable<\/em> podcast<\/a>. Joining me again as our co-host for this series is Anastasiya Kazakova, a Senior Public Affairs Manager who coordinates global cyber diplomacy projects at Kaspersky.<\/p>\n<p>As a reminder, the Community Podcasts is a short series of podcasts featuring frank cyber diplomacy conversations with cyber-heroes who unite people despite everything \u2013 growing fragmentation, confrontation, and cyber threats \u2013 there are people who build communities and unite people to work together for the common good. Why are they doing this? And are their efforts working?<\/p>\n<p>For our 4<sup>th<\/sup> episode, by Allison Pytlak, the Program Manager for Reaching Critical Will. Reaching Critical Will is the disarmament program of the Women\u2019s International League for Peace and Freedom (WILPF), the oldest women\u2019s peace organization in the world. Reaching Critical Will works for disarmament and arms control of many different weapon systems, the reduction of global military spending and militarism, and the investigation of gendered aspects of the impact of weapons. Allison contributes to the organization\u2019s monitoring and analysis of disarmament processes and its research and other publications, as well as liaises with UN, government, and civil society colleagues.<\/p>\n<p>Over the course of our conversation, we discuss the importance of gender in the international cybersecurity landscape, working with the UN, what the future holds for her and WILPF and more.<\/p>\n<p>For some of the articles referenced in the podcast, check out:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.reachingcriticalwill.org\/resources\/publications-and-research\/publications\/14677-why-gender-matters-in-international-cyber-security\" target=\"_blank\" rel=\"noopener nofollow\"><em>Why gender matters in international cyber security<\/em><\/a><em>\u00a0(WILPF and APC)<\/em><\/li>\n<li><a href=\"https:\/\/reachingcriticalwill.org\/resources\/publications-and-research\/publications\/15159-programming-action-observations-from-small-arms-control-for-cyber-peace\" target=\"_blank\" rel=\"noopener nofollow\"><em>Programming action: observations from small arms control for cyber peace<\/em><\/a><em>\u00a0(WILPF)<\/em><\/li>\n<li><a href=\"https:\/\/reachingcriticalwill.org\/disarmament-fora\/ict\/oewg\/cyber-monitor\" target=\"_blank\" rel=\"noopener nofollow\"><em>Cyber Peace &amp; Security Monitor<\/em><\/a><em>\u00a0(WILPF-RCW monitoring of OEWG meetings) plus our relevant page:\u00a0<\/em><a href=\"https:\/\/reachingcriticalwill.org\/disarmament-fora\/ict\" target=\"_blank\" rel=\"noopener nofollow\"><em>https:\/\/reachingcriticalwill.org\/disarmament-fora\/ict<\/em><\/a><\/li>\n<li><em><a href=\"https:\/\/unidir.org\/publication\/system-update-towards-women-peace-and-cybersecurity-agenda\" target=\"_blank\" rel=\"noopener nofollow\">System Update: Towards a Women, Peace and Cybersecurity Agenda<\/a>\u00a0(UNIDIR, diverse authors)<\/em><\/li>\n<li><a href=\"https:\/\/unidir.org\/publication\/gender-approaches-cybersecurity\" target=\"_blank\" rel=\"noopener nofollow\"><em>Gender approaches to cyber security<\/em><\/a><em>\u00a0(UNIDIR, diverse authors)<\/em><\/li>\n<li><a href=\"https:\/\/www.peacewomen.org\/sites\/default\/files\/Action%20Coalitions%20and%20WPS%20Policy%20Brief%205.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><em>Technology and Innovation for Gender Equality<\/em><\/a><em>\u00a0(WILPF)<\/em><\/li>\n<li><a href=\"https:\/\/cybilportal.org\/publications\/making-gender-visible-in-digital-icts-and-international-security\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Making Gender Visible in Digital ICTs and International Security<\/em><\/a><em>\u00a0(Sarah Shoker, University of Waterloo)<\/em><\/li>\n<\/ul>\n<p>\u00a0<br>\n<iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/21021485\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/00a88e\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p>\u00a0<br>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A conversation with Allison Pytlak of Reaching Critical Will to discuss why we need more gender equity in cybersecuirty.<\/p>\n","protected":false},"author":636,"featured_media":19068,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[444],"class_list":{"0":"post-19067","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-podcast"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/community-podcast-wilpf\/19067\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/community-podcast-wilpf\/23615\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/community-podcast-wilpf\/25688\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/community-podcast-wilpf\/23748\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/community-podcast-wilpf\/42886\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/community-podcast-wilpf\/29930\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/community-podcast-wilpf\/29734\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19067"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19067\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19068"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}