Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Digital Mastery & Intersectional Diversity in Tech

SoSafe
04/28/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • AI-generated identities like Shudu raise critical questions about exploitation and misrepresentation when creators profit from digital representations of marginalized groups they don't belong to.
  • True diversity in tech requires intersectional thinking—addressing race, age, ability, and socioeconomic factors, not just gender representation in leadership.
  • Digital mastery combines technical expertise with ethical leadership, requiring professionals to confront uncomfortable gray areas and make values-driven decisions even at personal cost.
  • Structural change requires asking what needs to change for underrepresented groups to say yes to leadership roles, not just whether they want those positions.

Intersectional Diversity and AI Ethics

Aya Jaff opens with a provocative case study of Shudu, an AI-generated black female supermodel controlled by a white male creator. This example frames a broader discussion about exploitation, misrepresentation, and profit structures in emerging technologies. Jaff argues that diversity in tech cannot be reduced to gender alone—it must encompass race, age, ability, and socioeconomic background. She highlights how AI systems have historically failed marginalized groups, from cameras that cannot properly capture darker skin tones to interfaces that exclude elderly users. The keynote challenges the audience to recognize that true diversity means addressing structural inequality, not just optics.

Digital Mastery as Ethical Leadership

Jaff defines digital mastery as the intersection of technical competence and ethical leadership. She shares her personal experience walking away from an AI startup when investors pressured her to train data using underpaid workers in the global south. This decision, though costly, exemplifies the kind of critical thinking she advocates for tech leaders. She outlines a four-stage journey: learning technical skills, understanding industry trends, confronting ethical gray areas, and ultimately choosing to change systems rather than perpetuate harm. The keynote emphasizes that those with technical skills and privilege have a responsibility to question the status quo and build more equitable systems.

Rewriting Power Structures in Tech

The session concludes with practical strategies for creating inclusive leadership. Jaff recounts how a former boss asked not just if she wanted a leadership role, but what needed to change for her to say yes—leading to a job-sharing arrangement that accommodated her responsibilities. She warns against cynicism in diversity work, noting that progress is already happening through innovative approaches like shared leadership positions. The keynote positions inclusion not as a moral luxury but as a strategic imperative, urging leaders to move beyond surface-level diversity metrics and address the power dynamics that determine who builds the future and who benefits from it.

Chapters

0:00 - Introduction: Tech, Finance & Identity
2:00 - The Shudu Case Study
5:00 - Digital Exploitation & Misrepresentation
7:00 - Diversity Hierarchies in Tech
9:00 - Navigating Ethical Gray Areas
12:00 - Digital Colonialism & Data Control
13:20 - Digital Mastery Framework
15:00 - Personal Ethics vs. Investor Pressure
18:00 - Changing Systems, Not Just Participating
19:00 - Rewriting Leadership Structures

Key Quotes

4:55 "Exploiting people is something that we have seen time and time again. One example we have seen is that already white people are playing black people in movies. And not just black-facing. I'm not talking about black-facing in theaters back in the days. I'm talking about real white people that can be altered in those after cuts, whatever, by AI, and have a role where a black person may experience something very traumatic."
7:41 "In other words, when companies talk about diversity, I notice that they talk about diversity only in those lower ranks, I would say. You might think, okay, there's a woman there, maybe in the third or maybe even second stage, right underneath the CEO. But it's very often a white woman."
10:45 "If a man starts a war, it's bad. If an educated Latin woman, girl boss a little too hard and starts a war, it is still bad."
12:44 "Big tech companies are grabbing our natural resources, our data, to control our views, track our movements, and discriminate against us."
17:15 "I urge you all to be a little bit more critical. It's difficult, and it takes a personal sacrifice. For me personally, it was a pretty huge sacrifice, because I said, I can't do it. I don't want to do it."
20:01 "Is what needs to change for you to say yes? ..."

Categories:
  • » Data Protection
  • » Cybersecurity » Endpoint Security
  • » Cybersecurity » Compliance & GRC
Channels:
News:
Events:
Tags:
  • AI & Machine Learning
  • Compliance & Governance
  • Executive Briefing
  • Thought Leadership
  • Best Practices
  • Intersectional diversity
  • AI ethics
  • Digital colonialism
  • Tech leadership
  • Algorithmic bias
  • Inclusive design
  • Data exploitation
  • Ethical decision-making
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Digital Mastery & Intersectional Diversity in Tech

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version