Women In Security Magazine Issue 1

Page 1

01

MARCH • APRIL

THE FUTURE FOR WOMEN IN SECURITY IS NOW P16-19

ARE WE DOING ENOUGH? P50-51

AUSTRALIA’S FEMALE SECURITY PIONEERS P6-10

THE BEST COMPANIES FOR WOMEN TO WORK IN SECURITY P106-108

W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M


FROM THE PUBLISHER

T

Raising the profile of women in security may be my passion, but it’s everyone’s job here’s a difference between reading about

growing passion to make a difference – to help

the lack of women in security, and doing

Australia’s cybersecurity industry overcome the built-in

something about it.

biases that are limiting businesses and keeping our best

I’ve worked both sides of that argument – first during 10 years as publisher of CSO Australia, and more recently

and brightest young women from an industry that is already primed to give them satisfying, flexible, rewarding careers.

in partnership with the Australian Women in Security

Empowering women to join the security community is

Network (AWSN) – and I assure you that doing

a core goal of AWSN, and in the seven years since I met

something about the situation is much harder, but also

founder Jacqui Lostau we have been working hard to

much more rewarding.

build a community capable of driving change.

As publisher, I read articles about how women in security

Yet for all its successes, I quickly realised that AWSN

were sparse; blog posts advising CSOs about how

could only do so much as an association. Staff were

to retain the few women already working in security;

all volunteers and most had full-time jobs. Some had

requests for female mentors or career advice; and social-

families and some did not, but all were working every

media posts from successful security women sharing

hour of their days – as colleagues, mentors, advisors,

advice about how to not be the only female in the room.

advocates, and more – to make a difference.

It was a great job, although I didn’t understand all the

Watching their commendable and ongoing efforts, I

security parts – but I managed to work through that part

realised that it is not AWSN’s burden alone to change the

with the help of a very supportive, patient network.

way females are seen within security, or to increase their

At the same time, the debate became more than academic when I was faced with teenage girls growing up in a school system where tech subjects were just not cool. Out in the real world of education, cybersecurity and STEM still don’t get much of a mention – and IT was always advocated for by the nerdy, uncool teacher. Can we really be surprised that teenage girls wouldn’t go for this? In recent years I have been working to explore my

numbers in the industry. It’s not the responsibility of any one committed group to show females the many exciting career paths in security, or to identify standout achievers and highlight them as paragons to inspire others. It is all of our responsibility – and this publication is one small step in the ongoing effort to provide a solid platform for women in the security industry. Looking back, the ingredients were all there: the industry knowledge. The wonderful relationships I have gained and nurtured with like-minded individuals over the


Abigail Swabey

years. The amazing women who are leading IT security, cybersecurity, physical security, security resilience and privacy teams. They’re out there, doing great work every day – and their stories need to be told. We have taken some concrete steps to do this in recent years, not only by growing the membership of AWSN into the many thousands but through steps such as establishing the annual AWSN Women in Security Awards in 2019 and running the second (albeit virtual) awards last year. This publication gives the industry a platform to recognise the work of all those amazing women – not only to recognise their achievements, but to motivate the next generation of students to ignore their school’s bias, and give cybersecurity a try. I hope you’ll continue to join us on this journey to hear these stories, share your thoughts, and help make that little bit of difference in your own way. It’s only together that we can balance the playing field – and help the security industry benefit from the amazing talents of some of Australia’s most capable, inspiring women.

Abigail Swabey PUBLISHER, Co-founder at Source2Create aby@source2create.com.au

WOMEN IN SECURITY MAGAZINE

3


CONTENTS Building cyber culture into the business from day one

12

Cybercrime is big business

14

The future for women in security is now

16

A Day in the Life

42

Diversity in security: Not just about men and women

44

CAREER PERSPECTIVES

2

What you need to know about cybersecurity careers

46

Three career tips to thrive as a woman in cybersecurity

48

Are we doing enough? A cybersecurity career perspective from a multipotentialite 53

PUBLISHER’S LETTER

7

Advice on joining the infosec industry

56

Things to remember for women in tech

61

Introduce yourself to leadership the power of a strong network

64

Security is not just about hacking

66

Why cybersecurity as a career

68

AUSTRALIA’S FEMALE SECURITY PIONEERS

WHAT’S HER JOURNEY?

4

WOMEN IN SECURITY MAGAZINE

Kate Monckton

22

Toni James

26

How parents can keep up with apps and online games

70

Joss Howard

28

Tales from the trenches

73

Skye Wu

30

Rachel Okoji

33

Nicole Neil

34

Diversity, like security, should be built in from the ground up

80

Mary Attard

36

Jodie Vlassis

39

Bri Hadley

40

76

(CYBER) SECURITY CULTURE EATS (CYBER) SECURITY STRATEGY FOR BREAKFAST


MARCH • APRIL 2021

TECHNOLOGY PERSPECTIVES 2021 and Beyond the future of cybersecurity is promising 86 Security as basic hygience Running a digital cyber security treasure hunt

INDUSTRY PERSPECTIVES

88

90

Behind the scenes of an ICT woman during and post COVID 72

Social Media Security

94

Driving a slow car fast and a driving a fast car slow

Cybersecurity in companies and the protection of fundamental rights

80

The heroes of AusCERT2020 the women in security who made it happen 82

Infosec and RM working together for safer sharing

ADVERTISING Charlie-Mae Baker JOURNALISTS

92

Diversity, like security, should be built in from the ground up

Abigail Swabey

Abigail Swabey

Mitigating against online Social Engineering

74

FOUNDER & EDITOR

David Braue Stuart Corner SUB-EDITOR Stuart Corner

96

DESIGNER Jihee Park

99

Helping businesses safely embrace digital

102

The Privacy Paradox

104

Women in Security magazine is published by Source2Create ABN 25 638 094 863

www.womeninsecuritymagazine.com contact@source2create.com.au

110

WOMEN IN SECURITY MAGAZINE CONTRIBUTORS

Source2Create Pty Ltd is the publisher of this magazine and its website (www.womeninsecuritymagazine.com). AWSN is the official partner of Women in Security Magazine

TURN IT UP

114

OFF THE SHELF

118

106

THE BEST COMPANIES FOR WOMEN TO WORK IN SECURITY

©Copyright 2021 Source2Create. All rights reserved. Reproduction in whole or part in any form or medium without express written permission of Source2Create is prohibited.


SUBSCRIBE TO OUR MAGAZINE Never miss an edition, subscribe for the magazine today for exclusive updates on upcoming events and future issues, along with bonus content.

SUBSCRIBE NOW


F E AT U R E

AUSTRALIA’S FEMALE SECURITY PIONEERS by David Braue

For Australia’s female security pioneers, cyber is all in a day’s work

WOMEN IN SECURITY MAGAZINE

7


FOR AUSTRALIA’S FEMALE SECURITY PIONEERS, CYBER IS ALL IN A DAY’S WORK

enhance the

Different career paths, different responsibilities – and

“While amazing

a shared love of cyber’s challenges

women have always been working in cybersecurity,”

Culture change, that time-worn bon mot goes, starts

Bilal says, “it’s only recently that many of them are

nation’s threat sharing.

at the top – and Australia’s cybersecurity industry is

being publicly recognised.”

no exception.

Bilal, who actively participates in the Defence

As recent years saw the world waking to the

internship program and enjoys mentoring interns

increasing prevalence of cybersecurity threats and their real-world impact, the industry has been led by – and inspired by – a slew of talented women whose mighty efforts might have gone unnoticed but for

every year, noted the preponderance of “really supportive and high profile female leadership figures” at organisations such as the Australian Signals Directorate (ASD), Australian Cyber Security Centre

concerted efforts to bring them into the spotlight.

(ACSC) and industry-development body AustCyber.

Through awards programs, media coverage and

Ongoing support from both men and women

networking through bodies like the Australian Women in Security Network (AWSN), cybersecurity practitioners have rapidly come to learn about the significant work of women like Rania Bilal, a former

across the sector has helped Bilal advance her “exciting and rewarding” career, which has seen her working in research and development, C# software development, firmware coding, and now as a cyber

officer in CERT now working in the Australian Cyber

threat intelligence technologist.

Security Centre (ACSC) cybersecurity team to

She hopes ongoing recognition of female industry pioneers will inspire even more women to join

8

WOMEN IN SECURITY MAGAZINE


F E AT U R E

the industry: “It’s great to see women increasingly recognised through awards and greater leadership,” she says.

challenge and engage her. “My formal qualifications have nothing to do with computing,” she says, “but I worked in a cybercrime

“I hope this becomes normal practice so that

intelligence role. I’ve written a few books now, and

more women are inspired to join the cybersecurity

when I speak at conferences I’m trying to make

profession and discover everything this exciting

people understand that cybercrime is not something

career path has to offer.”

weird and elusive; it’s just like any other crime type, and anyone can be a victim.”

MANY ROADS TO CYBER Indeed, for many women in cybersecurity that career path has taken all manner of twists and turns – and continues to do so as they progress through the broad and deep range of options that it offers.

Her goal in working in cybersecurity likely resonates with many other women who have found the industry’s allure irresistible: “I want to help harden our community, harden our nation, and harden the world against becoming victims of cyber crime,” she

Mandy Turner, for one, wasn’t expecting to end up

explains.

in cybersecurity: her first degree was a Bachelor of

“That is something I really do care about – because

Music, for example, and she recently completed a Bachelor of Dementia Care before entering a 20-year career with a government agency before moving laterally into cybersecurity. Now, Turner works as manager of the University of Queensland Cyber Security Operations Centre (CSOC) – the latest step in a career arc that continues to

it’s never going away.” As well as advocating for better cybersecurity understanding, Turner has watched in dismay as popular media representations of shadowy hackers pollute the discussion – making everyday users believe “there’s this shadowy supervillain behind all of

WOMEN IN SECURITY MAGAZINE

9


this, so there’s no hope for them and they no longer help themselves.” “We need to stop that narrative of the supervillain,” she says, “because it isn’t a super villain. It’s just a criminal.”

STEPPING UP DURING A PANDEMIC Many of cybersecurity’s most high-profile women share a passion for cybersecurity that keeps them actively engaged on myriad fronts at the same time. For cybersecurity consultant Jo Stewart-Rattray, her deep fascination with the industry, and engagement with the sector, have kept her engaging with a broad range of roles – whether as director of information security and IT assurance with BRM Advisory,

the deployment of two national call centres staffed by home workers, as well as managing a widely distributed security team that was facing similar challenges from home working. It wasn’t her first secondment – and it was, she recalls, an eye-opener to the many ways that cybersecurity impacts everyday business and the operations of essential services. “I found that when I did that, it really made me recognise the needs of my clients and what they face,” she explains, “and what CIOs face on an everyday basis. It

“I hope more women are inspired to join the cyber security profession and everything this exciting career path has to offer”

puts you back in touch with the real world of security – and it’s good for the soul to not just be dropping the report and leaving.” Managing security during a pandemic meant addressing both technological and business issues, she pointed out, as well as the additional people-

vice president of communities with the Australian

management skills involved in keeping people

Computer Society, recent president of the Association

communicating across the distance.

for Intelligent Information Management (AIIM), member of ISACA’s information-security advisory board, and even part of the Australian government’s official delegation to the United Nations’ 62nd Session of the Commission of the Status of Women. Never one to gather moss, when the COVID-19 pandemic hit last year Stewart-Rattray began thinking about how she could help – and ended up seconded to health and in-home care organisation Silver Chain Group as chief security officer. Given the challenges that had descended on the entire health and aged-care industry almost overnight, she says, it became clear “the bad guys aren’t going to wait so we can’t wait.” Working with Silver Chain four days a week, StewartRattray found herself at the front line, helping secure

10

WOMEN IN SECURITY MAGAZINE

“It’s about the people aspect, and looking at how I can keep the team feeling connected,” Stewart-Rattray explains. “The face of work has changed, I think permanently, and we’ve seen that many organisations that I work with will continue to encourage people to work from home.” “And while I hear some people having a bit of a whine about how you can’t collaborate, I think you can. It just requires a different mindset.”


CONNECTING - SUPPORTING - INSPIRING

AWSN Membership Benefits: Mentoring Community Support

Education Careers Events

Visit awsn.org.au for information about exclusive events, programs, and content. Join Australia's largest community of women in cyber and physical security.


SNEZANA JANKULOVSKI

BUILDING CYBER CULTURE INTO THE BUSINESS FROM DAY ONE by Snezana Jankulovski, Chief People Officer at CyberCX

CyberCX’s Snezana Jankulovski is helping combine

“I’ve been literally starting from ground zero,” she

15 companies into one – so what could possibly go

says, “in building a scalable people and culture

wrong?

function – and an amazing workplace experience –

Late in 2019, the founding of CyberCX created a major player in Australia’s cybersecurity

ago.”

industry overnight. Twelve different cybersecurity

Given the range of businesses and sizes – the

consultancies coalesced into one firm with more than

member organisations had between 3 and 90 staff

500 cybersecurity professionals spread across more

each – it was a challenging task but one, she says,

than 20 offices in Australia, New Zealand, Europe and

that was facilitated as she and the transition team

the United States.

discovered broad commonality in the companies’

Since then, CyberCX has gone from strength to

workplace philosophies.

strength – adding three more companies and

“We were very selective and brought together

drawing on its consultants’ collective decades of

organisations that are the best at what they do,” she

expertise to support clients in areas such as strategy

explains, “and they were very similar in terms of their

and consulting; security testing and assurance;

cultural characteristics.”

governance, risk and compliance; identity and access management; digital forensics; and more.

“Through that process I saw that so many of these organisations had so much in common,” she

Snezana Jankulovski has been with CyberCX from

continues. “They were all obsessed about customers

the beginning – and, as the company’s chief people

and delivering great solutions, and worked so well

officer, she has taken on the challenge of integrating

together – which just made our job so much easier in

15 different company cultures into a single, unified

terms of bringing them together.”

whole.

12

for an organisation that didn’t even exist 12 months

WOMEN IN SECURITY MAGAZINE


D I V E R S I T Y

&

I N C L U S I O N

EQUIPPED FOR CHANGE

dynamics based on what was proving effective and

The novelty of CyberCX as a merged organisation

valuable.

gave Jankulovski scope to build a culture that embodies workplace ideals around gender equality

BUILDING AN INCLUSIVE CULTURE

and equal representation.

Managing the shift to virtual working was an

“We made a commitment very early on in our journey that diversity was a key part of who we are,” Jankulovski says, “and committed to create an

unexpected challenge, but it did help lay the foundations for the flexible work models that are tied to ideals around workplace gender equality.

inclusive workplace irrespective of gender or other

“It really helped us reinforce our commitment to

attributes.”

flexible working,” Jankulovski says, “and this is

As someone with extensive expertise in change management – she is a Prosci Certified Change Practitioner who has previously worked in people and culture roles with organisations like Cox Automotive,

something I and the executive are very committed to – because if we’re going to be able to attract the best people and most diverse workforce, we’ve got to embrace it.”

Dimension Data and Telstra – Jankulovski was well

CyberCX launched a formal diversity strategy on

equipped to guide CyberCX through a period of rapid

International Women’s Day this year, committing to

change.

promoting the engagement of women in cyber and

Yet just as employment contracts were formalised,

sponsoring organisations such as AWSN.

policies harmonised, payroll in place and the new

The company has sponsored cyber scholarships for

corporate culture emerging, the COVID-19 pandemic

women studying cybersecurity, and the board tracks

hit – and the executive team’s priorities shifted

gender diversity as a key performance metric of the

towards a singular focus on supporting staff safety

business. In February, the company will also welcome

and efficiency at homes.

a cohort of 15 cybersecurity graduates – with an even

“We had to work very quickly to put those things in place,” Jankulovski recalls, “and we had to produce

split of men and women – participating in its first cybersecurity graduate program.

policies that might normally take months to refine,

Through these and other initiatives, Jankulovski

overnight.”

believes CyberCX has been able to embrace diversity

This also included introducing additional leave days, supporting locked-down staff with care packages, and

as a core business issue that will serve it well as it continues to grow from strength to strength.

refining the way that project teams worked together

“We’ve got a lot more to do,” she says, “and we are

– addressing tasks such as regular communication,

nowhere near where we want to be. We want to see

ensuring regular stand-ups via videoconferencing, and

more women in leadership roles, and to see our

engaging with staff through regular virtual ‘town hall’

numbers increase – but there is no silver bullet.”

meetings attended by the senior executive team. “We were determined that everybody would work through the pandemic and that we would survive,” she says, “and we did that by managing the transition virtually. My prior roles very much equipped me to manage massive, large scale change – but at the end of the day, it’s all about communication.” Yet for all its organisational challenges, the pandemic also saw a surge in demand from customers seeking to secure their own remote-working transitions – and this not only helped CyberCX grow quickly, but helped

“The key is to understand that gender diversity is a business issue, not a gender issue. It’s something that we’re absolutely committed to – and it’s a no-brainer because diversity brings huge benefits.”

Jankulovski bed down the organisation’s cultural WOMEN IN SECURITY MAGAZINE

13


AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist

C O L U M N

Cybercrime is big business Cybercrime is big business, thanks to technical advancement and interconnectivity creating more opportunity for cybercrime. This regular column will explore various aspects of cybercrime in an easy to understand manner to help everyone become more cyber safe. TECH SUPPORT SCAMS Tech Support scammers are very active, and highly organised. They operate from rented office spaces, just like a traditional call centre. They lure their victims in several ways: website popups, cold calling, fake virus alert popups, or with websites that spoof well-known tech or telecommunications vendors. The cold call version starts with the scammer telling a target there is an issue with the target’s Windows computer that must be fixed immediately. If this ploy is successful, the victim is directed to install legitimate remote viewing software that gives the scammer full access to the victim’s computer. The scammer might then open the computer’s event log or use commands in the Windows Command Prompt screen to present information to the victim as evidence of malware on the computer. If the victim is now convinced the computer has a serious problem the scammer persuades the victim to pay to have the computer ‘repaired’. While in the system, the scammer may also configure back doors so they can surreptitiously return to the computer later and steal account credentials. Sometimes the scammer will also install malware into the victim’s computer disguised as essential repair software. It doesn’t end there. The scammer may make a follow up call offering the victim a refund for the ‘services’ provided earlier.. Their aim is to gain financial account details and steal more money from the target.

14

WOMEN IN SECURITY MAGAZINE

What to do if you are the victim of a tech support scam If you paid a tech support scammer with your credit or debit card, contact your bank immediately as you may be able to stop the transaction. If the payment was made using a gift card or voucher, immediately contact the organisation that issued the card and explain the situation. If the scammer gained access to your computer, scan it with up-to-date and reputable anti-virus software and change passwords to any accounts you accessed from that computer. In Australia report the crime via https://www.cyber. gov.au/acsc/report,. In another country, report it to your local police or through the relevant cybercrime reporting mechanism. Tech support scams are big business – stay safe.


20th Annual AusCERT Cyber Security Conference

11th - 14th May 2021 // The Star Hotel, Gold Coast, Australia

4

DAYS

50+ SPEAKERS

IN PERSON & VIRTUAL

Keynote Speakers

Ciaran Martin

Maddie Stone

UNIVERSITY OF OXFORD

GOOGLE PROJECT ZERO

REGISTER NOW

conference.auscert.org.au WOMEN IN SECURITY MAGAZINE

15


THE FUTURE FOR WOMEN IN SECURITY IS NOW by David Braue

Surging cybersecurity investment in 2021 could turn COVID-19’s ‘pink recession’ into a force for equality

T

he COVID-19 pandemic changed all

to accommodate staff working from home in ways

the rules, pushing remote working

that they simply had not done in the past.

into the mainstream and driving cybersecurity into the boardroom as companies scrambled to protect their rapidly-changing security postures.

Yet while women were losing jobs or working hours faster than men early in the pandemic – leading many to refer to its economic fallout as a ‘pink recession’ – as companies pivot away from its first year many women are finding that it has also created a broad range of new opportunities. Fully 53% of respondents to the recent Arlington Research-Kaspersky Women in Tech 2021 Report – a survey of 13,000 technology workers in 19 countries – reported that the number of women in senior IT or technology roles had increased over the past two years, when the company first ran the report. With 95% of female technology workers working from home at least part-time since March 2020, many women in the survey said the lockdown had made them feel more autonomous, with companies forced

16

WOMEN IN SECURITY MAGAZINE

Interestingly, women living in the Asia-Pacific region have taken to remote working even better than their counterparts elsewhere in the world: 58% of APAC respondents agree that remote working facilitates gender equality, well above the 46% global figure. Yet there is still a long way to go before the cybersecurity industry reaches the levels of gender equality that it could – and 47% of respondents said that the pandemic had delayed career progression, reinforcing an underlying understanding that industry has been more positively impacted by the pandemic’s change than the evolution of socially-imposed gender restrictions.

A CHANCE TO TWEAK TEAM DYNAMICS Indeed, despite years of talk about equality just 24% of cybersecurity workers are female, according to widely-cited (ISC)2 figures derived using a lessrestrictive methodology than an earlier one that pegged the levels at just 11%.


F E AT U R E

WOMEN IN SECURITY MAGAZINE

17


of project teams, with just 10% of the survey

TRANSFORMATION IS ABOUT MORE THAN SYSTEMS

respondents reporting that they work in a female-

Much of that proactivity is already being seen,

This imbalance continues to shape the makeup

majority team – compared to 48% that report working in a male-majority team.

AustCyber CEO Michelle Price noted during a recent National Press Club address in which she welcomed

Despite the gender imbalance, however, there are

the increase in representation of women in Australian

encouraging signs that company culture is moving in

cybersecurity roles.

the right direction to support women in cybersecurity

From just 4% five years ago, she said, “we’re now at

better in the past.

29% – and we’re estimating that, with the graduates

Around 7 in 10 respondents believe their skills and experience were more important than their gender when applying for their first IT role, and a similar proportion believe their opinion would be respected from the beginning, regardless of their gender. “Given that the idea of gender balance is steeped in perceptions and attitudes,” the report notes, “this is a critical

“Last year, the decision was made on behalf of businesses to level the playing field in which men and women can operate… To ignore that opportunity when all statistics point towards this being an enabler of gender equality, would be an opportunity missed.”

sign of progress.” “Beyond tangible percentage rises in employment or boardroom positions,

that will come out over the next couple of years, that

how women feel in the tech space and how they

will get pretty close to 40% within the next five years.

experience daily life in the IT sector is pivotal to

But whether or not we can retain women within these

understanding real evolution.”

fields is a completely different thing.”

Coming into 2021, then, the cause of gender diversity

Supporting and reinforcing this surge in female

faces both a reiteration of an ongoing problem – that

workforce participation will be crucial – but with the

women are still underrepresented in cybersecurity –

pandemic pushing face-to-face networking online for

and a potential source of optimism, in that women

the foreseeable future, both companies and women

working in cybersecurity are feeling more included

in cybersecurity will need to get creative to keep this

than ever.

momentum.

This duality, the report notes, means the interruption

Yet Jacqui Lostau, a long-term cybersecurity

of the COVID-19 pandemic could turn 2021 into a

consultant and founder of the more than 2000-strong

great leveller for women working in cybersecurity.

Australian Women in Security Network (AWSN),

“The events of 2020 could be a catalyst for more

believes the cause of gender diversity was already

accelerated progress as long as social biases don’t

headed in the right direction before COVID-19 pushed

block the way,” the report notes, “and if tech as

the network’s activities online.

an industry is proactive in changing its traditional

“A lot of companies now come to me asking whether

processes and mindsets.”

I know of some great candidates for their roles,” she explains. “They want to increase the diversity in their

18

WOMEN IN SECURITY MAGAZINE


F E AT U R E

teams – which I think is a great conversation to have,

This change in spending habits has positioned

as opposed to years ago when we were still having

cybersecurity at the heart of the global

those conversations about why diversity is important.”

transformation, with recruitment firm Hays noting that

“That conversation has shifted now: most people understand that diversity is important, and they want to do something about it.” This year, those same organisations will have a very real chance to do something about diversity as they invest in staff to secure the fruits of a yearlong splurge – which saw many organisations compressing complex years-long digital transformation plans into just a few months. Fully 81% of Australian businesses accelerated their digital transformation during the pandemic, according to one recent Trend Micro survey, while IDC recently noted that 60% of Australian small businesses are now in “survival mode” – with 51% planning to

early investment in cloud-based remote work support systems “quickly shifted to cyber security candidates” as organisations began pivoting towards their longerterm digital and technology talent strategies. With the old rules gone and companies committed to change in 2021 by hook or by crook, this year marks what the Arlington Research report’s authors call “an unforeseen and (hopefully) one-time opportunity to accelerate change.” “Last year, the decision was made on behalf of businesses to level the playing field in which men and women can operate… To ignore that opportunity when all statistics point towards this being an enabler of gender equality, would be an opportunity missed.”

increase their IT spending this year and cybersecurity crucial in every instance.

WOMEN IN SECURITY MAGAZINE

19


2021 AND BEYOND What to expect from the Australian Women in Security Network (AWSN) AWSN was founded in 2014 as an open network of people aiming to grow the number of women in the

2022 AND BEYOND: INCREASING FUTURE PIPELINE OF WOMEN IN SECURITY

security community in Australia.

• Future plans of the network are to establish new programs focusing on high school students and a

Since it’s formulation, the network has come a

return-to-work offering for women in security who wish

long way and has continued to inspire, support and

to re-enter the workforce after a career break or hiatus.

connect women in the industry to those looking to enter the field with the tools, knowledge, network and platforms needed to build each members’ confidence and interest. As we look towards embracing a new phase of the network, here are are some key focus areas on the AWSN agenda in 2021 and beyond:

UPLIFTING CURRENT PROGRAMS • The network is committed to the quality delivery of its core capabilities which span across networking events,

HOW TO CONNECT, SUPPORT AND INSPIRE WOMEN IN SECURITY As the network continues to mature, AWSN is absolutely in need of supportive colleagues, champions, women and men, to be part of our cause and vision. Let’s support women in every step of their career journey, inspire them to pursue a career in security and help build the Australian pipeline of talented security professionals.

its AWSN Cadets Program and the annual AWSN Awards programs. • The network aims to optimise and uplift the National

YOU CAN DO THIS BY:

AWSN Cadet Program, increasing the number of

Becoming an AWSN member or

participants, workshops and study groups.

encouraging someone to be a member

Signing up to be a mentor

2021 FOCUS: SUPPORTING WOMEN IN SECURITY

The network recognises that we must focus on

initiatives to help retain and support the current

women working in this industry. • The network is committed to the goal of retention and

union of women working across the sector. • The network is implementing various programs to

Nominating someone for an award Speaking, or encouraging someone to speak at one of our events

Writing, or encouraging someone to write for the magazine

advancing women in security across • Australia by understanding the current state-of-the-

Hosting or attending one of our AWSN events

Post internship or jobs with us

Volunteering, Sponsoring, Supporting the organisation

support and help the cohort of women in security grow; these include: a Mentoring Pilot program (sponsored by ASD and powered by OK RDY), a

Come and join our AWSN community. To find out

series of Women in Leadership programs, a Women

more about the network’s initiatives, please visit:

in Security Study survey, a and a Small Business

awsn.org.au

Mentoring Pilot program. • The network sees itself as the conduit between other great initiatives and partners within industry aiming to achieve the same mission. For example partnering with companies such as Source2Create who have produced this incredible magazine.

20

WOMEN IN SECURITY MAGAZINE

The AWSN would like to thank their sponsors, volunteers, members and supporters who have helped shape the community into what it is today.


WHAT’S HER JOURNEY?


On a Symantec trip to Hawaii I met my future husband, who lived in Sydney. Three months later I quit my job and being just shy of 30 was still eligible for a backpacker visa so I came to Australia to have some time off and see what happened. Within two months I had landed a role as the Security and Privacy Initiatives Lead for Australia at Microsoft. Around 2010 my then boss at Microsoft became the first permanent CISO hired by nbn. When he was building out the team a role came up that looked like a great new challenge in an exciting young company doing something great for the country. So I made the move, along with a few of my Microsoft colleagues.

Kate Monckton

I started at nbn in July 2011 when the company was

General Manager Security and Privacy Assurance, Risk and Consulting at nbn

years, because of the speed at which the company

planning a full FTTP rollout. Over the next nearly 10 grew, I had a huge array of amazing professional experiences and challenges. I doubt there are many companies where I would have had similar opportunities.

M

I’ve always been in the security group at nbn in y journey into cybersecurity started very far away: with a degree in German and philosophy from the University of Leeds in the North of England.

My first job after graduating was in the European arm of an American boutique management consulting company that specialised in helping IT and CE vendors with their retail and SMB sales and marketing strategies. One of the company’s major clients was McAfee, and working with McAfee sparked my interest in cybersecurity. That was back in the mid 2000s when people were becoming more connected and threats were becoming more mainstream. After four years with that consultancy I fancied a stint client side and went to work in Symantec’s marketing team. Much of my work at Symantec was on the consumer side and that was when I became really interested in

security and cyber safety influence/culture programs. My current, recently created, role is a fantastic professional opportunity. It encompasses the privacy, information security consulting, risk and assurance. I am presently on parental leave but normally I share the role with Sarah Hosey with each of us working four days a week. I’m unaware of any other GM level job share arrangements in the industry. Sarah and I are really proud to role model how effective it can be and I hope that these kind of things become more the norm for everyone. Our portfolio comprises everything to do with managing the privacy program at nbn, from helping the operational front end of the business understand and manage its privacy risks to developing the long term strategy and policy for handling personal information. We also lead the teams that provide hands-on security consulting support to the business, and the teams that manage security risk and provide

cybersecurity, cyber safety and privacy. Looking back

internal and third party security assurance.

I bored a lot of people in my personal life with stories

My typical day has a lot of meetings (most of them

about protecting themselves online!

22

various leadership roles, generally in privacy and

WOMEN IN SECURITY MAGAZINE

remote at present). Most mornings we have a senior


W H AT ’ S

H E R

J O U R N E Y ?

need for a trusted and secure network that’s reliable and readily available to all Australians. We have an amazing culture within the Security Group that cuts across all levels of the organisation. Last year we came second and highly commended in the Australian Women in Security Network awards for the Best Place for Women to Work. I try to be offline by 5:30 so I can have some family time before my daughter goes to bed and only log on after 7pm if it’s absolutely needed. I spent the first 10 or so years of my career smashing out 80 hour weeks but since I got a handle on my work/life balance by prioritising much better I have had more success professionally and personally. leadership team (SLT) stand-up and once a week we have a longer SLT half day meeting with Darren Kane, nbn’s Chief Security Officer. On the days Sarah and I both work we have a 1:1 meeting first thing to make

When I was younger I felt I had to know everything to be credible professionally, especially in my first role with the consultancy. Over the years I’ve learned that is just not true. Pretending to know more

sure we’re clear on our plan of attack for the day and

than you do is incredibly detrimental.

the week ahead.

But you do need people around you whose knowledge

When you work in security what you think your week

and judgement you trust and can draw upon when

is going to look like is often not the way your week goes. So clear and open communication with Sarah, with the wider leadership team and with our direct

you need some help. I am lucky to have a great professional support network, many of whom are also good friends. I run things by them and sanity check

team is critical.

when I doubt myself.

The rest of the day is generally a mix of formal and

I also got really lucky with some amazing mentors

informal meetings that includes meetings with individual teams and leaders who report into our function, meetings with the cross-company Steering Commitees and project meetings. I am a natural early

who challenged me and helped build my confidence by throwing me in the deep end and letting me figure out that I can swim pretty well when given the chance. It’s also a great relief when you realise that it’s OK to

riser so I tend to spend an hour or two before my

make the wrong call sometimes.

toddler wakes up clearing email and reading through

If a decision you make is what you think is the best

reports etc. before having breakfast with her and doing the day care run. From 8:30 onwards it’s pretty much go go go in meetings.

at the time based on the information at hand, it’s not the end of the world when things change. How you respond to and acknowledge those changes is far

We all work incredibly hard but have a lot of fun every

more important.

day. We challenge each other constantly so there

I have had some great advice from past and current

is no scope to stagnate or stop learning. I also feel strongly about the mission of the company and the

colleagues and mentors. When this was critical

WOMEN IN SECURITY MAGAZINE

23


of how I had handled things it was really hard to

It is important to have diversity, with representation

swallow. But, without fail, with hindsight I have totally

of different genders, cultures, nationalities, abilities

agreed with the feedback.

and socio-economic backgrounds in all walks of life.

Darren Kane, my current boss, always talks about the key to success being to get the right people working with you. It can be easy to hire people because you have a need and they have the skills, but if their attitude and approach does not compliment the culture you want to promote they will cause you more

Without this we are limiting ourselves to an incredibly narrow way of thinking and acting. By harnessing the power of a wider variety of experiences we open the door to some really exciting opportunities to do things better, which in security and privacy can only be positive.

pain in the long run. I’ve definitely learned this the

I really love the human side of my role, helping grow

hard way over the past 15 years.

and develop the team. I’d say I have a reasonably

In the early days I often felt like my lack of technical or vocational training was a huge negative and felt out of my depth in many a product discussion. Over time I started to see how my background and strengths in communication and strategy were very complimentary to those of the technical people I worked alongside.

high level of emotional intelligence that helps me build genuine trust with the people I work with. I gave up trying to have a work ‘persona’ many years ago when it became too tiring trying to be who I thought I should be professionally versus allowing my ‘at home’ self to come with me to work. I don’t shy away from hard conversations with people, because I think if you’re honest and straightforward people will

“When I was younger I felt I had to know everything to be credible professionally, especially in the consulting role. Over the years I’ve learned that is just not true. Pretending to know more than you do is incredibly detrimental.”

respect you and want to keep working with you. I really encourage people into careers in security and privacy. The need is growing and there are some amazing roles out there, and you never stop learning or being challenged. Get involved in as many

I have really seen a shift over the past ten years

professional groups as you can, such as the

towards the industry being much more welcoming of

Australian Women in Security Network (AWSN), the

people who don’t have tech backgrounds, which has

Security Influence and Trust Group, the Australian

been a huge benefit by promoting diversity of thought

Information Security Association (AISA), etc. Join the

and approach. Early on I definitely felt judged for not

virtual meet-ups, or even better, offer to help with the

having a computer science degree and not being able

organisation behind the scenes. This is where you will

to make jokes about TCP/IP.

meet people in the industry and figure out what you

I’ve often been the only woman and the only nontechnical person in leadership teams within security

If anyone reading this wants to chat to me about how

groups (although thankfully that has changed a great

to move into the industry I’m always very happy to

deal over the past five or so years). At times it’s made

do so (via LinkedIn message is probably best), but

things harder, but more often than not there have

maybe give me a couple of months to get this new

been benefits to being able to provide a different take

baby into some kind of routine!

on things.

24

enjoy.

WOMEN IN SECURITY MAGAZINE


Mentoring Pilot AWSN is pleased to launch the 2021 Australian Women in Security Network Mentoring Pilot.

Looking for ways to give back? We need you Learn more at awsn.org.au/initiatives/mentoring/ Sponsored by

Powered by


IT’S NEVER TOO LATE TO CHANGE YOUR STARS

I

started my security journey long before I knew the security industry to be an option. My daughter was three years old and I was working a job I absolutely loved in the snowboard industry, but the pay was low and jobs were

seasonal. Life was stressful because money was tight and I wanted more options: more freedom for my family, more opportunities for my daughter. I knew there was so much more I could do with my life. I grew up with computers, playing video games and learning programming in school, so I knew tech was an option. I even started down that path straight out of high school, before being quickly derailed by the lure of the snowboard industry. Don’t get me wrong, getting into that industry was

Toni James Product Owner | Security Advisor | ChCon.nz Organiser | Diversity Advocate | Speaker SafeStack Limited

26

WOMEN IN SECURITY MAGAZINE

the right decision at the time. It brought me around the world to New Zealand from my home in the USA, and led me to meet my husband (in the lift line while snowboarding). I regret nothing about choosing that path in life.


W H AT ’ S

H E R

J O U R N E Y ?

What I do regret is getting stuck, doubting I could

I didn’t win the first scholarship I applied for, but I was

take a new path or pursue a different career when I

a finalist, which got me a trip to Sydney and training

had no guarantee of success. It was the absolute fear

in diversity and inclusion initiatives. This opened

of failure that held me back. It was far easier to just

up further pathways into research and leadership

apply for another job, settle for the best pay you could

opportunities. I applied for a software engineering

get, and make ends meet. Believe me, it took me nearly five years and a bout of depression to realise this and work up the courage to change my stars. When I finally worked up the courage to change my stars and do something different, I didn’t know what I wanted to be. I really

“What I do regret is getting stuck, doubting I could take a new path or pursue a different career when I had no guarantee of success. It was the absolute fear of failure that held me back”

envy people who can answer the question “What do you want to be when you grow up?” They seem so driven and confident, so clear on what they want in life, and so focused on achieving it. I’m not one of those people. I want to be happy. I want to be financially stable and have time to enjoy life with my friends and family. I want to contribute to society in a positive way. I want to help others through the tough times in life. I want to share my story, to help others find their place in the world, and support them along the way. One thing I did know was that a job in the tech industry could give me opportunities to be all those things. So I chose to study for a degree in computer science. It’s an extremely versatile degree, the study

internship at a local software company, and got one for two years. Many things I applied for I did not get, but the key here is: I applied, and when the opportunity was right, I said yes. The opportunities I’ve followed have taken me to Australia, India, Singapore, Argentina, and the United States, and I’ve learned so much along the way. Eventually, those opportunities led me to the security industry. When I was working as a software engineer in a healthcare software company, I found security to be a high priority. This sparked my interest, and the more I learned about security, the more I wanted to know.

regime was flexible enough to accommodate my

I applied for diversity funds so I could go to security

childcare options, and I was able to choose classes

conferences. I spoke at security conferences and

that interested me.

meetups, and I studied security “for fun”. And when

One notable benefit it gave me was being able to take opportunities as they presented themselves. I’m still limited by where I live, and by my education and training, but when someone says “Hey you’d be great at X! Have you ever thought of working in Y?”, it opens options I never knew existed. During my first month at university Google visited my campus on a recruiting mission and hosted a Women

someone said “Hey, you’d be great at this! Ever thought about working in security?” I took that opportunity, and I changed my stars again. I still don’t know what I want to be when I grow up, but right now, I love where I am. www.linkedin.com/company/safestack/ academy.safestack.io/about-safestack/

in Tech event. I met several Googlers who were interested in my story and encouraged me to apply for

twitter.com/safestack

scholarships, internships and programs.

WOMEN IN SECURITY MAGAZINE

27


M

y journey into cyber security started in the early 1990’s with a recalcitrant computer. I was in the Royal Air Force and helped my commanding officer prepare PowerPoint

presentations for his meetings. The computer I used kept breaking down, so I took it upon myself to learn how computers worked and fix it. Then a friend who worked in a new area in the RAF called ‘computer security’ told me she was leaving and suggested I apply for her position. I did. I got it, and I’ve never looked back. At that time information and systems security was a very new area. Few of us understood what was needed. But we worked together as a team (all male, except for me) and we evolved with the industry.

Joss Howard

Our managers encouraged us to research, to learn,

Cyber Security Senior Advisor, NCC Group APAC

Support and guidance from them were available

and to try and resolve issues as best we could. in abundance. A mistake wasn’t a mistake, but an opportunity to learn and try again. Today there seems to be too much pressure to get things right first time, and too much emphasis on blame, which is such a shame. In those early days computer security conferences were male dominated. I found them tiresome: it was hard to find anyone who looked or thought like I did. There were men who would champion the cause of equality, but they were few and far between. Things are much better today. There are opportunities to discuss security and share opinions with a wider audience, and long may that continue. The inclusion of different cultures and backgrounds in cybersecurity is important. Diversity breeds

“The inclusion of different cultures and backgrounds in cybersecurity is important. Diversity breeds collaboration and innovation. Hackers don’t discriminate, so why should we? ”

28

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

collaboration and innovation. Hackers don’t

J O U R N E Y ?

discriminate, so why should we? In security, to be effective we need to stop discrimination and take on the challenge of diversity.

Assisting sales in qualifying, proposing and designing solutions to bids and other responses.

No two days are the same. Regulatory changes, new cyber security standards, changes in technology, new

I have led and managed teams from diverse

cyber-attacks, sales and research, keep me very busy

backgrounds and each member brings a different

and out of trouble!

perspective based on their experience. These different experiences lead to pragmatic, flexible solutions that fit with an organisation, making that organisation an easier and, frankly, a more pleasant place to work. I’ve learnt much from team members that has helped me serve the team better. It’s been enjoyable to hear (and sometimes experience) other cultures. Today I consult to boards, senior management and department heads on how to reduce cyber risk and increase cyber resilience in their organisations. My consultancy can take the form of strategising, operational transformation, assessing an organisation’s current security posture, or providing security awareness. My role is diverse and continually changing. One day I might get to speak to the most senior people in the business and help solve their cyber security challenges. Next day I could be helping my client improve their cyber resilience.

I’ve been in information security – in one way or another – for 30 years. I have had great privilege of working in more than 10 countries in the EU, North America and APAC. I have had the honour of helping more than 60 clients ‘change the security dial’ for the better. I never expected this when I started out! I am an avid reader and apply what I learn. In the early days, I built my own computers and networks at home and tried to hack them. I would then build on that experience. I also set personal goals to see what I can achieve in a given time. Then I reflect on what I had achieved. I am also willing to take a risk and follow an opportunity. I have found there is usually a small drop when you take that initial step, but it’s followed by a rise. I have taken many courses over my career, generally around leadership and management, operating systems and networking, information and cyber risk management, and privacy. These have also included:

As an executive principal consultant my role covers

Certified Information Systems Security Professional

marketing, sales and delivery. My day could include:

(CISSP); Information Security System Management

Leading the client in defining their cyber security strategy;

Providing thought leadership through conducting webinars, delivery of blogs, articles and interviews with journalists;

Conducting control assessments of a client’s security posture and creating security roadmaps;

Recommending boards and C-level clients on options to reduce cyber risks in their organisation;

Conducting an incident response scenario exercise to improve a client’s cyber resiliency;

Writing and delivering policy;

Acting as the point of contact between sales, the

Professional (ISSMP); Certified Information Systems Auditor (CISA); Certificate in Information Security Management Principles (CISMP); Certified Data Privacy Solutions Engineer (CDPSE). So, if you are considering a career in cybersecurity my advice would be: go for it! Take risks and grab opportunities as they come along. Accept that there will be challenges along the way, but know you can overcome them. Be open to learning and put in the hard work needed to be successful. Get yourself a mentor or coach to help you along the journey, for either professional or personal development. They act as a great ‘sounding board’ and provide independent insight and guidance to help you along the way. www.linkedin.com/in/joss-h-5571981/

client and our business;

WOMEN IN SECURITY MAGAZINE

29


identify business risks that are unknown to the organisation.

Skye Wu

I see the most important part of my job being to

Cyber Security Investigator, Speaker, Mentor & Champion for Diversity

away from the team so its members can focus on

take mundane work, such as administrative tasks, the important tasks, like working with data to distil interesting findings that can be turned into actionable

I

fell into a career in security after I became interested in digital forensics at university for my bachelor’s in information systems degree. I enjoyed problem solving and working out how/why something happened. I realised that by doing digital

No two days are the same. Generally I like to start my day doing a bit of reflection and thinking, be it looking over the project we are working on, or the team’s annual plan and the goals we are hoping to achieve in the current financial year.

forensics for law enforcement I would also be able to

Most of my time is taken up with data analysis work,

do some good for society. So it became a no-brainer

asking questions of the data to distil interesting

for me to start my career there.

insights, and playing with visualisations so the insights

I was recruited into the computer crime squad with no practical experience, only knowledge gained from books (before YouTube!). The senior sergeant who hired me told me on my first day I would have a steep technical learning curve, but he hired me because I was

can be presented to and consumed by a range of audiences (technical and business). I also look for potential opportunities for continuous improvement, and document our findings and learnings in our growing knowledge base.

able to show I had the aptitude and thinking of a digital

I also work in the Australian Women in Security

forensic analyst.

Network (AWSN) where I lead the AWSN cadet

I spent years working in law enforcement, followed by several stints in consulting. I was fortunate to have worked with some of the best minds in the industry very early on, and I learnt much from my colleagues in law enforcement, and later those in consulting.

program. I became involved with AWSN after meeting founder Jacqui Loustau several times at networking events. I initially became an industry advisor to AWSN’s Melbourne chapter and ran a workshop for the Melbourne cadet members. I really believe in what the cadet program hopes to achieve. So when

However, my job was always to investigate something

the opportunity came to expand my role and lead the

after the fact; get involved after a litigation had already

program nationally, I jumped at it.

begun, and I became weary of being always on the responding side of the equation. I began to wonder if it were possible to move into an area where the work would be more preventative than reactive. I joined Telstra in 2014 as an open source security analyst and a few years later my boss, Chris, dropped me into the discovery team to help on a temporary secondment. I became really interested in the proactive nature of the role, so I decided I wanted to stay. Luckily the feeling was mutual! Since September 2019 I have been acting Discovery manager at Telstra. The Telstra discovery team uses data the company is already collecting to proactively

30

intelligence internally.

WOMEN IN SECURITY MAGAZINE

I work with AWSN leads, including other cadet leads, and with AWSN committee members to provide a safe environment in which our cadet members can learn, collaborate and interact with their peers and industry professionals. I dedicate a few hours each week to cadet work. This includes looking after the Slack channel where our members collaborate. Since COVID the security workshops for our cadet members have run virtually nationwide, and I also work with committee members to ensure our planned workshops go ahead. What I love most about both my roles is the opportunity to be proactive. In my day job, I can help the


W H AT ’ S

H E R

J O U R N E Y ?

business get on top of potential problems. As AWSN

Working in digital forensics, I was not taken seriously

cadet lead I help new talent prepare for careers in

and accepted as an equal by my male counterparts

cybersecurity. It’s an opportunity for me to reciprocate

who performed the same role. And I was sought after

the support I had on my journey.

for roles and opportunities because to my gender

The industry is an ecosystem; it’s important to help

rather than for my experience or qualifications.

develop others at the same time as you develop

I was then made to feel unworthy and undeserving

yourself. I have learnt a lot about myself through

of recognition for my skills and expertise, with

mentoring and supporting others.

discouraging comments from male colleagues in

In the early days of my career my self-doubt and lack of mentorship from leaders who were able to recognise

senior positions, such as “You only got recognised as a diversity stunt.”

my personality traits and how I worked limited my

Being female and also a first-generation migrant from

personal development.

China led to advice such as “you should not apply

My main personal challenge stems from traits I was, unfortunately, born with: self-doubt, self-defeat and

for federal government roles as you are Chinese and people won’t trust you.”

self-sabotage. For a very long time I would turn down

I’ve also been accused of not behaving as a member

opportunities unless I knew I could do 100 percent of

of the team, because I outed a “team-bonding”

the job. I would sometimes put myself down believing

competition that involved weight-lifting and other

it to be a sign of modesty. I experienced my most

weight-related gym exercises in which the whole team

personal development and growth only when I took a

could not participate equally.

leap into the unknown.

I believe companies need to not only close the gender

Understanding what motivates you and why you do

gap, but also consider broader diversity, including

it will guide you on your career journey. And don’t be

diversity of skill, thinking, experiences, etc. Teams and

afraid to fail: sometimes our biggest setbacks are

organisations that do not take an interest in broad

opportunities to propel ourselves further.

diversity run the risk of applying tunnel vision to the

Over time I got comfortable with the idea of putting myself into situations that terrified me, like public speaking. I also started to get comfortable with making

work they do, the products and services they provide, and of missing opportunities to recruit and maintain talent that could help drive their organisation forward.

mistakes and failing. A very wise industry influencer

So, build yourself a solid support network, attend / seek

once told me “if you are feeling challenged, it means

out industry events, join industry groups such as AWSN,

you are growing!” Having that kind of support and

and the AWSN Cadets. There are many experienced

advice really helped me on my journey.

men and women in the industry who are supportive of

It took a great manager who recognised my abilities and prodded me in the right way to get me to move out

new talent entering the industry. Networking will help you connect.

of my comfort zone. That came after several years in

Be open to new opportunities, even if people and

different workplaces with different managers.

your own inner voice are telling you ‘no’. Be open

I also faced many challenges simply by being female. At university I was discouraged from pursuing a career in digital forensics because the industry is very maledominated. From the moment I decided I wanted to work for law enforcement doing digital forensics without any handson experience, I knew I had to grow a thick skin. I had to swim or drown, and drowning wasn’t an option.

to failure, own your mistakes; people aren’t likely to remember how you failed, but they will remember how you picked yourself up. Know who you are, know your values as an individual. Write them down on Post-it notes and put them somewhere you can see them whenever you need to. www.linkedin.com/in/skye-wu-ba390919/ www.skyewu.com

WOMEN IN SECURITY MAGAZINE

31


W H AT ’ S

H E R

J O U R N E Y ?

A PROGRAM THAT CONNECTS, SUPPORTS AND INSPIRES FEMALEIDENTIFYING TERTIARY STUDENTS AND EARLY CAREER PROFESSIONALS.

"When women work together, they become a force to be reckoned with. Be part of a force for good in the security industry, by joining the AWSN Cadets program today!" - Liz B, Co-Founder

Studying or an Early Career Professional in information security? Learn more at awsn.org.au/initiatives/awsn-cadets/ 32

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

Rachel Okoji Virtual Intern, Mossé Cyber Security Institute

Most female success stories tell of battles won against gender discrimination, as they should. I have encountered such battles, but my journey so far has been driven by sheer stubbornness. I was the kid who played soccer in a boys’ only team and then went home to play with my dolls. I insisted on being in the science class even when my teachers suggested arts would be a better fit. I was also the kid who went and did things simply because nobody thought I could. For the average female child from a traditional Nigerian home there is a pretty clear-cut life path – go to school (if your parents are open to that), maybe get a small job until a rich prince shows up to ask for your hand, and then have children. Basically, the life of a typical Disney princess complete with the ‘happy ever after’. Unlike the male children, you are expected to aspire only to becoming a good wife and mother. My family is both traditional and modern, so I could very easily have settled for that life. Maybe I would have been happy, but I wanted more, and I went in search of it. With my transferable skills, I was able to jump from one job to another but I did not. I was not satisfied. So, I decided to take a daring step away from nine-tofive jobs and into freelance writing, mostly because I needed time to figure out what I really wanted to do. Of course, there were days when I questioned this decision and on one such day, I stumbled upon a training opportunity for women in cybersecurity. Because my IT proficiency did not extend beyond basic PC operation, I did not expect to be selected, but I was.

I rated my technical experience as being almost the lowest in my cohort. To get up to speed, I did some research into cybersecurity and ended up doing a deep dive into the history of computing. There I encountered the amazing contributions of Charles Babbage and a number of remarkable men. Much deeper into the dive, I stumbled upon the less talked about contributions of women like Grace Hopper, Shakuntala Devi and Ada Lovelace, to name a few. It was rather disturbing to find I had never heard of the first two women in any of my computer science classes, despite their huge contributions. I was no stranger to the fact that, over the years, women’s achievements have been mostly downplayed or completely ignored. My discovery fuelled my desire to follow this track even further. I went through my cybersecurity training like a wide-eyed child, filled with wonder as we explored the fundamentals of security in the cyber world. Despite the less than ideal circumstances brought about by the pandemic, I was able to complete the training with the steady support of a community of determined and intelligent women who were breaking the glass ceiling and clearing the path for others. While my career journey is still at the very beginning, I am determined to play my part. I may not emulate the locked-up-in-a-castle princess or the sleeping princess, but my hard-headedness can certainly be likened to Mulan’s. www.linkedin.com/in/rachel-okoji-714a14138

WOMEN IN SECURITY MAGAZINE

33


THINGS TO KNOW IF YOU ARE CONSIDERING A JOB IN CYBER SECURITY

Nicole Neil Senior Manager Information Security - APAC at Newell Brands. She is passionate about security training and awareness, by making it personal the hope is to change behavior at home and at work. She is keen to see more women in Information Security and enjoys encouraging and educating others to learn. She is currently studying a Masters in Cyber Security at Charles Sturt.

M

y journey into the world of cybersecurity was probably different from most. A cybersecurity role came up in the company I worked for. I applied and was successful.

At the time, I was told I did not have the necessary certifications, experience, or knowledge. Looking back, that was a fair statement. This article describes what I learnt from my journey into this exciting and fascinating field. I hope it will help others considering work in cybersecurity.

1. UNDERSTAND WHAT INFORMATION SECURITY/ CYBERSECURITY IS There are many disciplines and technologies in cybersecurity, such as Identity and Access Management (IAM), or Security Operations (SecOps), and Governance Risk and Compliance (GRC). Decide which area interests you the most. For example, I see GRC as the domain of the police, those enforcing policy and educating people. SecOps is about finding vulnerabilities and reducing threats. SecOps specialists work in parallel with the GRC team because the R in GRC is about risk, identifying it, and conducting assessments. Finally, the IAM team looks

34

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

after access controls, again working with the SecOps

5. WATCH WEBINARS.

team to control who can log in, making sure they are

Whenever I was in a meeting, and a particular product

logging in securely, and that they have been identified, authenticated, and authorised on a network.

2. ACRONYMS

was being looked at, I googled it and then joined webinars on it and read a lot about the vendor and the product. I have found this to be another way to get access to free learning. These webinars will give you

I can laugh about it now, but when I first joined the

information on how vendors use products to mitigate

Information Security team, I spent the first few

risk and counter threats.

months living in Google. I had no idea what an ISMS was. For those that don’t know, it’s an Information

6. JOIN GROUPS

Security Management System, or even what a SOC

There are many. I would highly recommend the

was. No, it’s not what you put on your foot. A SOC is a security operations center. There are 100s of acronyms to learn, and some acronyms cover three or four different things. Take MAC, for example. It can be the media access control address of a computer or mandatory access control. And in cryptography, a MAC is a message authentication code. I mean really, it’s crazy. Get ready to learn a lot of acronyms.

3. CERTIFICATIONS, STUDY, CONTINUAL LEARNING

Australian Woman in Security Network (AWSN). This is an organisation of women who are passionate about cybersecurity, connecting, supporting and inspiring each other. There are also other groups such as ISACA, CompTIA and ISC2 that are industry bodies for cybersecurity education, and the International Association of Privacy Professionals (IAPP). I have subscribed to the Social-Engineer Newsletter, and I can recommend Mike Chapple’s website, who provides great free training and resources on the CISSP and Security + certifications. There are many

I would encourage anyone looking to get into

online groups focused on cybersecurity. Some require

cybersecurity to study. There are many free learnings

a fee, but the long term benefits can more than justify

available, but there are also many industry body

the cost.

certifications you will need to pay for. I started with the Security + by CompTIA and found this to be

7. FIND A MENTOR

a very good basis for learning. From there, I went

I have a mentor in my manager, and I would highly

into the CISSP and then onto a number of ISACA certifications. My favorite course at the moment is my master’s in cybersecurity. I am thoroughly enjoying the content and have learned a lot about networking and cryptography, the dark web, forensic investigations, ethical hacking, risk, and

recommend finding someone who sees your value and your passion, working with them, and learning from them. There is much to learn in this industry. You can never know everything, but you can learn from others and grow and find new ways to do things.

the foundation of information security. It’s a great experience if you have the time and the money.

4. PRIVACY

If you find cybersecurity exciting and you look forward to learning, I encourage you to get involved, learn as much as you can, and don’t believe you can’t do

As much as you need to know about information

it because you lack the right certification. You can

security and all the threats, acronyms, and lingo, you

learn and you can grow. I am proof of that. It’s about

need to also understand privacy, how data is used,

passion. It’s about seeing the need to educate users

stored, and retained. In particular, you need to know

and people in general and helping them learn how to

the General Data Protection Regulation (GDPR), the

stay safe and be more cyber-aware.

Australia Privacy Principles, the Australia Privacy Act, and the Australia Signals Directorate’s role.

www.linkedin.com/in/nicole-neil-2ab56422

WOMEN IN SECURITY MAGAZINE

35


I quickly learned the value that my business knowledge and experience brings to the table. I’m able to bridge the gap between ‘the business’ and

Mary Attard Partner, Cyber Security & Digital Trust - Identity & Access Management at PwC Australia

security, and in today’s digital world this couldn’t be more important. I chose to pursue a career in security because of the impact I can have in helping organisations understand how good security practices are fundamental to enabling their businesses. I’m now a Partner at PwC in Cybersecurity and Digital Trust and lead our Identity and Access Management (IAM) practice, helping my clients manage customer or enterprise identities through the design and implementation of identity management solutions. I love my role - it gives me the opportunity to work with some amazing clients from organisations of all sizes and industries. I help them solve their cybersecurity and IAM problems, working with a brilliantly talented team whilst mentoring and supporting the careers of my team. I really enjoy the variety of my work. No two days are

L 36

the same. My days are often full of meetings: client meetings to talk about the status of an inflight project ike many people I was never really sure what I wanted to be when I grew up and I definitely never planned for a career in cybersecurity. I have a background in risk management and experience in technology

or a new challenge they’re facing; team meetings focussed on delivery of our projects; career coaching conversations; working with the other partners on the day-to-day operations of our business. Many things have contributed to my success, but I

implementation projects. I ventured into the world of

think the most important is confidence and an open

cybersecurity when I was offered an opportunity to

mind to the possibilities on every level, from how I

manage an Identity and Access Management project

approach a problem on a project to how I go about

at PwC.

finding my next role.

This opportunity came up during a conversation

Confidence is like any other muscle: you have to

over coffee with a PwC Partner - I had no idea

continually exercise it. I build confidence (and

such a role existed and wasn’t even sure that I had

continue to, everyday) by putting myself out there

the right experience for it. The lesson there - don’t

and just giving whatever it is a go. Confidence comes

underestimate the value of your network; you never

from backing yourself in. Sure you’ll make mistakes

know when your next coffee could turn into a career-

and things won’t be perfect, but it’s not the end of the

changing opportunity!

world, you learn the most from those experiences.

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

And success doesn’t come without hard work. That

management, Agile delivery, risk management and

doesn’t have to mean long nights and weekends. It

Lean Six Sigma. I have a Green Belt (is that still cool?)

sometimes means taking on the challenges others

and executive coaching qualifications. I’m very much

shy away from. Don’t be afraid to take risks, step

an experiential learner. I love learning by just diving in

outside your comfort zone and learn from your

and trying new things.

experiences. Finally, make sure to find sponsors and advocates in your organisation and in your network. Everyone needs a cheer squad. Make sure to surround yourself with people who can remind you of how awesome you are when you need to hear it.

I’m sure there’s a straighter career path than the one I’ve taken, but I think it’s also what I’ve loved most about getting to where I am today, and a big part of my success. I would encourage others to be open to opportunities that may not be on their direct path.

Many amazingly talented individuals have taken

Always be inquisitive and open to learning new things,

the time to coach and mentor me throughout my

even when you think they aren’t relevant to your

career. I’m sure I haven’t made it easy for some of

current role.

them, but I can’t stress enough how important it is to surround yourself with people who you respect, are the kind of leader you aspire to be, and can provide you with advice, counsel and the hard truth when you need to hear it. They might work in your

“ The lesson there - don’t underestimate the value of your network; you never know when your next coffee could turn into a career-changing opportunity!”

organisation, or be someone in your network. It doesn’t really matter. What matters is that you find the right people to give you the guidance you need to continue to grow and learn.

Having a broad understanding or perspective of the world means you can bring more to your current role and open your mind to what else is out there. Put your

I believe my biggest obstacles have led to my greatest

hand up, have a voice and don’t be afraid to ask for

achievements. When starting a new role I try to prove

opportunities. Try not to let fear stop you from doing

myself and build my credibility rather than starting

something. I’d rather look back and say I gave it my

from a place of acceptance that if I’ve been appointed

best shot than look back with regret for not taking an

to the role I must be the right person for the job. My

opportunity, or not giving something a go.

unconscious bias means I’ve had to work twice as hard to make sure there is no doubt about what I’m capable of, more so to prove this to myself than to anyone else. So I’ve pushed myself beyond what I ever thought I could achieve in my career, and I’m nowhere near done yet. So far I’ve followed a diverse career path. I have a

The gender gap still exists, and we women continue to limit ourselves by looking at the world through the same lens of how things have always been. But, as we close the gender — and the diversity — gap we bring new perspectives and thought leadership to an industry that is rapidly changing. This can only be a good thing.

bachelor’s degree in business majoring in accounting. I’ve completed courses in project & operations

www.linkedin.com/in/maryattard/

WOMEN IN SECURITY MAGAZINE

37


REMOVING BARRIERS, AT WORK AND OUTSIDE OF IT Yet even at a young age, Vlassis says, she recalls that she “really knew cyber security to be very male oriented”. While doing consultancy work with Deloitte, Vlassis ran into Atlassian representatives at an industry

Jodie Vlassis

function – and, although she wasn’t looking for a job

Cyber Security SME in Trust and Security at Atlassian

grabbed it with both hands.

at the time, the new job opportunity arose – and she “I was fortunate to have joined an organisation like Deloitte where there were other females around,” she

REMOVING BARRIERS, AT WORK AND OUTSIDE OF IT Atlassian’s Jodie Vlassis warmed to cybersecurity at an early age, and never looked back

they’re too good to refuse, you have to put yourself out there.” Now working as Security Trust within the Trust and Security team in Atlassian’s Cyber Security SME,

Jodie Vlassis traces her interest in technology back

Vlassis explains that her responsibility “is to remove

at least to the age of 12, when she would watch

barriers, such as security blockers or any issues that

her brother “do some pretty cool things” developing

may prevent customers or potential customers from

software and decided she wanted to learn to do the

growing with Atlassian.”

same thing.

As someone supporting customers from the vendor

She learned Java programming at a young age and

side rather than the consulting side, Vlassis admits

steadily moved towards cybersecurity, which she

the new role has been a change – but in the end, she

eventually realised she savoured “for the pureness of

says, cybersecurity is cybersecurity.

it”.

38

says, “but when opportunities arise and you know

“The foundation of cybersecurity doesn’t change”

Cybersecurity is “constantly evolving,” she says.

from role to role, she explains. “What changes is

“It’s a fast-paced environment where there’s always

your end audience. But at the end of the day, we’re all

something new to learn – and that’s something that

here to achieve the same goal – to ensure that cyber

really excited me, and that I really wanted to be a part

security is at the forefront of every business, and we

of.”

do that by building trust through security.”

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

THE JOY OF MENTORING

mentor and support. It has opened up a new online

A nominee in several categories in 2019’s inaugural

world where we can now connect with anyone at any

AWSN Women in Security awards, Vlassis was a finalist in this year’s Best Champion for Women in

time – and I have enjoyed advising young women on how to make it in an industry where, unfortunately,

Protective Security/Resilience category.

women are still largely marginalised.”

It’s a badge she wears with pride, although she points

That situation has changed in recent years, she adds,

out that she grew into the role rather than seeking it

through greater advocacy for women in cybersecurity

out.

roles and the greater attention that many executives

“I’m not a traditional women’s rights activity by

representation.

are paying to issues around gender equality and

choice,” she says, “but because I have a role in the cybersecurity industry, it makes one me automatically – and I guess this is due to the lack of strong female leadership. As a result, I’ve become a de facto mentor.” Mentorship has proven to be in her blood, Vlassis says: “it brings me a lot of joy

Atlassian’s Jodie Vlassis warmed to cybersecurity at an early age, and never looked back

knowing that if I can be present and help at least one person, then at least I know I’m doing what I’m meant to do.”

Longer-term institutional change, however, will take

Her own career has been supported by mentors both

time – and broad buy-in.

in and out of her working environment, which she

”In my years in boardrooms I can attest to the

says has been invaluable by providing an unbiased opinion or point of view.

underrepresentation of women– and it’s a systemic problem that definitely needs to be changed,” she

“But don’t have a mentor just for the sake of having

says.

a mentor or because everyone else has one,” Vlassis

“Boosting economic and job opportunities for women,

says. “You need to make sure that a mentor is going to help guide you, and help you become the best version of yourself – so you can provide that to the

and marginalised groups, needs to be part of the solution,” she says.

next generation.

”But It’s not just a one-person solution, it’s an

She was given an opportunity, she says, “and if I can

within our workforce, expanding and creating

give back and pay it forward to someone, then I know I’m doing my job.”

REACHING OUT IN A TIME OF PANDEMIC The challenges of this year’s COVID-19 pandemic

everybody solution – and by increasing awareness mentoring opportunities, and forging womenoriented communities, we can really ramp up female representation.”

www.linkedin.com/in/jodie-vlassis-285074104/

brought the role into finer focus, as the shift to isolated remote working fostered a greater emphasis on networking and one-to-one support. “Since COVID happened, I feel like I’ve been given the opportunity to network more than ever,” she says, “and it has provided me opportunities to connect and

Follow Atlassian on LinkedIn, Facebook, Instagram and more; www.atlassian.com Want to know more about the security of our products? Head over to the Atlassian Trust Center www.atlassian.com/trust

WOMEN IN SECURITY MAGAZINE

39


WHERE ARE MY LADIES AT? Bri Hadley Creative, connector, and knowledge vacuum

BREAKING ASSUMPTIONS, CHANGING OUR PERSPECTIVES, AND OWNING OUR PLACE For most of their existence public policing and private security have been a ’boys club‘. Social expectations, ideas of ’propriety‘, and fear all played a role in the assumption that women and security do not mix. Under these assumptions, men designed the security industry, from its aims to its ideal candidates. Arguably, these were smart, rational men. In most circumstances, though, they would not (or could not) challenge their underlying assumptions—including their assumptions about the role of women. Our post-modern culture, even with its focus on diversity and inclusion, still suffers from this assumption blindness. If we want to move forward as an industry, we need to find and challenge these assumptions, keeping what is useful and replacing what is not. I like to use my career as an example of the impact of assumptions. I have always been an investigator— always curious, always wanting to know why, and always making connections. I come from a long line of security workers and first responders—police, military, private security, firefighters, nurses. I initially resisted a career in both traditional public policing and in the private sector. Growing up, I could not see myself thriving in the regimented culture of public police services. Also, I did not want to spend my time serving legal paperwork and chasing down cheating spouses. I assumed that, if I wanted to be in security, I had to choose one or the other.

40

WOMEN IN SECURITY MAGAZINE

After many twists, turns and false starts, I landed in investigations in my late 20s—all thanks to a few months of rather dramatic mistakes. Fortunately, I had a brilliant manager with a plan. While both embarrassing and frustrating, this plan gave me the time and connections I needed to redefine what a career in security (in this case, investigations) could look like. I met women who would become mentors who showed me where my career could go. Just over a year after being hired into the unit I went from being bored and disengaged to finding fulfillment in my work, every day. Over the years my role has included investigations, data analysis, business intelligence, and consulting functions. I love it! I think most people still assume that security workers have uniforms and badges, carry guns, put themselves in harm’s way to protect (or control) people. This, at best, is an incomplete picture. In the years since I joined the security industry, I have developed a very different picture of what policing and security look like. I have learned that physical security and information analysis are interdependent parts of the same whole. We ask questions, assess risks, and identify threats. Some of us collect, compile and analyse large amounts of information from an increasingly complex array of sources. Some of us find connections across seemingly unrelated groups of information and create risk-mitigation plans. Some provide advice and write policy. Others protect physical assets. If we want to do our jobs well (and I believe we do), then we need to paint this picture of the security industry, in all its diverse roles and functions. We need to be willing to challenge even our most basic assumptions. We need to take on new perspectives, and find ways to incorporate those perspectives into our daily work and our organisational structures. This is how we own our place in security. Then perceptions and assumptions can shift, opening a window into the world of security. When more women see what a career in security has to offer, they will come.


CONTACT NOW

DO YOU WANT TO PROMOTE YOUR BUSINESS TO A NEW TARGETED AUDIENCE? Contact us today to find out how you can be a part of the Women in Security Magazine!


Sara Moore Cyber Threat Intelligence Analyst

DAILY ROUTINE

A Day in the Life of a Threat Intelligence Analyst One of the most important aspects of my day as an analyst is my routine. Many people in cyber threat intelligence will tell you the job can be overwhelming, and a routine can help you navigate all sorts of confusing and difficult circumstances. I deliberately keep a close watch on how I spend my time so I can focus on my own wellbeing and my family’s wellbeing as well as my profession. I’ve done this consistently since becoming a mum, which any parent will tell you changes your life! It changed mine in many ways, one

vibrates to wake me up. This is because I really do not want to wake up the baby! I get up, put on my dressing gown and sneak downstairs to make a coffee. Then I read until 6:00am, because I am constantly being recommended fantastic books but cannot find the time to get through them. Fitting in reading has an immediate positive impact on my self-development.  6:00am: I do Yoga and meditate, to wake up my body. And I use meditation to help strengthen my focus for the day ahead. Focus (whether on data analysis or on a conversation) is key to being detail-oriented.  6:15am: I update my journal. This is one of the most valuable parts of my routine. One of the important characteristics of a good intelligence analyst is selfawareness and emotional intelligence. By writing down and understanding my fears and stresses before the day has begun, I can move more easily through whatever difficult circumstances might arise later, including those resulting from my own biases.  6:30am: Self-development time. This is when I work on something important for me. It could be a blog or an idea I have. It could be a course I am trying to get through. Self-development time gives me the chance to

of which was I developed a rigorous daily routine.

grow as a professional.

The first part of my day is most important. I get up

 7:00am: I wake my baby! I have lots of sleepy

at 5:00ams o I can be a more present mum to my

cuddles with her before making her breakfast and

nearly two-year-old when she is awake, and fit in

getting her to nursery.

some important steps before I start parenting and

 9:00am: I am at my desk. This is the ‘morning

working. This routine works for me, but I appreciate it might not suit other people with different pressures, especially those brought on by lockdown and homeschooling. Being a cyber threat intelligence analyst requires curiosity, awareness (of self as well as current affairs and threats), technical skills and communication skills. I try to think of these aspects of my profession in my daily routine. It’s a dynamic industry so it is important not to let yourself stagnate!

42

 5:00 am: I have a ‘silent alarm’ on my watch which

WOMEN IN SECURITY MAGAZINE

rushes’ part of my day. I spend a good half an hour reviewing my sources for information and reading news articles. This is to keep me abreast of what’s going on. If there is anything pertinent to the organisation, I will save the article. I will keep a note of any questions I have for potential reports or investigations. After this I look at my inbox and send any emails required. This means I have spent time being focused before getting distracted by emails and phone messages.


A

D A Y

I N

T H E

L I F E

The rest of my working day can be unpredictable. The day might be quiet or there might be an incident, but whatever transpires I have made the effort to be ready. On a quiet day my working morning consists of collections and hunting for malicious activity. On a busy day, anytime is incident time! Meetings can be spun up and a lot of activity can develop very quickly.

 12:00pm: I make space to exercise at lunch time: I walk, cycle or run. This is made easier because, like many people, I am presently working remotely. If the afternoon is quiet I car ve out time for analysis and report writing., for examp le, assessment and analysis of a particular top ic or a ‘business as usual’ distribution for situational awareness.

This routine has helped me find a way to multitask

 4:45pm: Wrap up tasks

and meetings. Before picking up the baby from nur sery I will try to write down at least one priority wo rk task for the following morning. This leaves me fee ling prepared to be productive.

develop self-awareness, two very important personal

 5:00pm: I pick up my dau

Robin Sharma in “5 am Club”. If you want to know

and have some fun before

 8:00pm: Baby is in bed,

ghter from nursery, we play

dinner, bath and bedtime. I go over my day, any

lessons learnt, any wins and

other ideas, I will write them

positives. If there are any

down. I might do some puzzles or catch up with fam ily and friends. 9:30pm: Bed. I leave my pho

ne outside the bedroom.

and meet my own needs, those of my family and my work. It has helped me think creatively and attributes that help me join dots and generate good assessments. Many aspects of my routine have been inspired by authors such as James Clear in “Atomic Habits” and more about cognitive aspects of intelligence analysis (biases) I would recommend the well-known classic “psychology of intelligence analysis” by Richards J. Heuer. www.linkedin.com/in/sara-moore-698594168/

WOMEN IN SECURITY MAGAZINE

43


CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2

C O L U M N

Diversity in security: Not just about men and women That heading in this magazine, in an article written

problems from a different angle you just might find a

by a MAN. Yeah, I know its probably a little risky but

simple yet eloquent way to solve a defence problem.

I not afraid of a little heat and if you are reading this you either work in security or would like too. Security is a risky job, we are all used to jumping in front of a train that is careening out of control, while on fire and we have no real way of stopping it. We just have to stare out at our pending doom, knowing we may fail. With that in mind stick with me for a minute, there is a point to this piece. Diversity is regularly seen as just bridging the gap between men and women but that is not enough.

Age is just one part, just like gender. Try adding any of the others listed and really mix things up. I am certain that if we all start to look at diversity in this light we will make big things happen in 2021. Let’s broaden the scope and work together. See it wasn’t all that bad, I am glad you stuck with me. Now go do your part and I will do mine to achieve true diversity. Until next time…

We need to look at diversity with a wider lens, see a broader diversity opportunity and capitalise on what we could achieve through that focus. Each person will look at things in their own way, depending on many things like personal experiences, education, personality, culture and just how their brain works or solves problems. Everyone is different and we need to embrace that, use it. If we focus on just one area of diversity, let’s say age. If you build a team of both men and women of all different ages from 18 through to 65, you will quickly

www.linkedin.com/in/craig-ford-cybersecurity

see that the different generations will approach problems in completely different ways. For security, this is a great thing. The mounting problems we face are complicated, the opponents we face are well funded and are incredibly skilled but if you look at

44

WOMEN IN SECURITY MAGAZINE

www.amazon.com/Craig-Ford/e/B07XNMMV8R www.facebook.com/pg/AHackerIam/ twitter.com/CraigFord_Cyber


CAREER PERSPECTIVES


MARIE-EVE LAPLANTE

WHAT YOU NEED TO KNOW ABOUT CYBERSECURITY CAREERS by Marie-Eve Laplante, Cybersecurity Strategic Advisor

Starting a new career in cybersecurity can be a little

solutions, antivirus, vulnerability management

intimidating. Media coverage of data breaches and

and more. Incident response teams are needed

cybersecurity incidents is becoming more common.

to manage crises, coordinating all stakeholders

Movies and TV series tend to focus more on hackers

and working under pressure. Audit teams are also

than on all the other professionals essential for the

essential to give an organisation and its shareholders

protection of information in an organisation. So, if

reasonable assurance that the security measures

you are not a hacker spending your evenings and

deployed are adequate. Your skills may fit many of

weekends on the dark web and developing scripts,

these profiles and could lead to an interesting and

should you consider a career in cybersecurity? The

fulfilling career in cybersecurity.

answer is a resounding YES!

NOT EVERYBODY IN CYBERSECURITY STARTS WITH A HACKER PROFILE

Cybersecurity is constantly and rapidly evolving. A

Ethical hackers and people with the skills to penetrate

couple of years ago few organisations were talking

systems are important for cybersecurity defence,

about cloud security, about user behaviour analysis,

but there are many jobs in cybersecurity that do not

or discussing how artificial intelligence would impact

require these skills. For instance, an organisation

defence and offence capabilities. New threats, trends

needs people specialised in governance, risk and

and technologies are emerging all the time. This

compliance to help manage priorities, investments

means, as a cybersecurity professional, you must

and regulatory requirements.

stay informed and adapt and evolve to meet the new

Operational security teams are needed to implement access controls, network security, data protection

46

YOU WILL NOT BE DOING THE SAME THING ALL YOUR LIFE

WOMEN IN SECURITY MAGAZINE

risks and priorities facing your organisation. No time to get bored!


C A R E E R

P E R S P E C T I V E S

WOMEN IN CYBERSECURITY

line with their perceived risks. Hence, it is important to

Cybersecurity professionals are typically cast as

develop a risk mindset early in your career.

nerdy, hoodie-wearing males, but a wide spectrum of

Cybersecurity professionals can be frustrated by their

skills is needed, and people of any gender can find

difficulty securing budget to fix what they see as an

a place. Furthermore, cybersecurity is constantly

important security issue. This frustration may arise

being reinvented in response to new threats, trends

because they have been unable to communicate the

and technologies. The idea that only men can be

level of risk to higher management, or because they

interested or thrive in cybersecurity is completely

have inflated the level of risk.

outdated.

FIND A NICHE OR BECOME A GENERALIST There are many domains in cybersecurity. So take the time to familiarise yourself with the most used frameworks such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework, or the Center for Internet Security (CIS)

Ask yourself not only if the vulnerability or weakness you identified could lead to a security incident, but also how it could hurt your organisation. A critical vulnerability that could give any malicious actor access to a system will represent a high risk only if the system itself contains sensitive information, is critical for the company’s operations, or can be used to gain access to another more important system. Being mindful of the actual risks faced by your organisation will help boost your

“If you are not a hacker spending your evenings and weekends on the dark web and developing scripts, should you consider a career in cybersecurity?”

credibility. In conclusion, there is no single profile of a cybersecurity professional. More than ever, organisations need your skills to help them enhance their security posture. They need analytical minds. They need coordinators.

Controls Framework. From there you can decide to become a generalist, by getting basic knowledge and skills in all domains and controls, or you can develop your expertise in a specific niche. Generalists are needed for roles such as audit, governance, risk,

They need technology-oriented people. They need managers. They need auditors. They need businessfocused people. They need hackers. They need security developers. They need testers. They need you.

compliance and information security management that call for a good understanding of roles played by

www.linkedin.com/in/marieevelaplante/

niche experts who focus on a particular aspect of cybersecurity. Their specific skills will be sought after to maintain and improve an organisation’s defences against current and new threats.

DEVELOP A RISK MINDSET In an ideal world, organisations would be able to finance any initiative to enhance their security posture. In reality cybersecurity budgets are limited, and organisations must therefore prioritise their investments in resources (people, money and time) in

Marie-Eve Laplante is a strategic advisor in cybersecurity for Desjardins. With 20 years of experience in information technology, including 15 specifically in information security, she now specialises in governance, risk, strategy and compliance. Her expertise includes cybersecurity management and risk management, strategic security planning, cybersecurity governance, risk and performance measurement, maturity assessment, business continuity, privacy, IT risks and operational risks. She has also undertaken several engagements in finance, energy, media, aviation and retail, among others. She has also frequently given training sessions, conferences and presentations to management and has been a lecturer at the Polytechnique de Montréal.

WOMEN IN SECURITY MAGAZINE

47


GIULIA TRAVERSO

THREE CAREER TIPS TO THRIVE AS A WOMAN IN CYBERSECURITY by Giulia Traverso, PhD- Senior Consultant Cybersecurity, EY

talk about my journey to becoming a cybersecurity

TIP #1: PAY ATTENTION TO THE COMMUNICATION CULTURE OF THE COUNTRY YOU’RE IN

expert, and my experience in the role. The panel was

I am Italian and I did my PhD in cryptography in

Back in November I was invited to join an online panel organised by the European Space Agency (ESA) to

organised primarily for students of the prestigious École polytechnique fédérale de Lausanne (EPFL), in Lausanne (Switzerland) to promote working at ESA. In particular, the goal was to show students the many different types of expertise, including cybersecurity, needed in the space industry.

Western European countries there were many adjustments I had to make to integrate into the German community. The most evident difference between Italy and Germany is the way people communicate. Italians tend to use long sentences

During the Q&A session I was asked (probably by

and to provide a lot of background before saying the

a girl) whether I had encountered resistance in my

thing they really want to say. This, I suppose, is to

career because I was a woman, and if I had some

better justify their request or opinion. This type of

tips to offer. I greatly appreciated this question and

communication, which I later discovered is known as

my answer received some positive feedback. So, I

‘high-context culture’, is very different to Germany’s

would like to share with you three career tips to help

‘low-context’ culture. In Germany, you just go straight

women thrive in male-dominated environments such

to the point and say what you want to say, period.

as cybersecurity.

48

Germany. Even though Italy and Germany are both

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

rude and aggressive. Because I was working in a male-

TIP #3: KEEP IN MIND THAT NETWORKING IS STILL WORKING, ESPECIALLY DURING LOCKDOWN

dominated field, it was easy for me to blame the males

There is a very interesting book

In a discussion, Germans value clarity and brevity. As a result, unprepared Italians like me see them as being

for my not being at ease during discussions. After a more careful analysis, I realised that, although males tend to be more aggressive than women, my perception of them as being aggressive was the result of me being ignorant of the local culture.. This realisation was liberating. Also, I knew I could train myself to communicate in a more low-context manner, which is also the way scientists are supposed to communicate. As a result it became easier for me to join discussions at work and my discomfort disappeared.

called “Nice Girls Don’t Get the Corner Office” by Lois P. Frankel, PhD that I highly recommend. One of its suggestions that caught my attention was to consciously and actively dedicate at least five percent of your working time to networking. According to Frankel, many women tend to undervalue those breaks and chit-chat moments in front of the coffee machine, seeing them as time wasted. In the short-term that is certainly

“Communication is key, so use it wisely. You cannot thrive unless you own your value and make it visible to other people”

true, especially under tight deadlines, but in the long-term such behaviour is likely to harm their careers. In turns out that the people who get promoted the most are those who are more visible and to whom other people can relate. If

TIP #2: ASK QUESTIONS WITHOUT UNDERMINING YOURSELF

you never join social breaks, you never give yourself a

I have noticed over and over again that, during the Q&A

The move to working remotely established during the

sessions of seminars and presentations, we women

COVID-19 pandemic is likely to make things worse.

tend to begin our questions by saying things like:

People are less visible when they do not come to the

“I’m not sure I understood the key concepts of Slide

office. So please, set aside at least one hour each

12”, or “Correct me if I am wrong”, or “I might have

week to expand your network and make yourself

misunderstood, but it seems to me that”, etc.

visible through LinkedIn, remote coffee breaks in

No way! Undermining yourself before asking the actual question is not the right way. Just go straight to the

chance to stand out.

Zoom with your co-workers etc. The only way to get noticed is to make an effort to get noticed.

point and say instead: “Can you clarify again Slide

The bottom-line tip of this article is: communication is

12?”, or “This is what I got from what you just said, is

key, so use it wisely. You cannot thrive unless you own

that correct?”, or “Can you articulate again your last

your value and make it visible to other people.

argument?” This tip is somewhat related to tip #1 above, because

www.linkedin.com/in/giulia-traverso-phd-13a749150/

it cautions against adding words additional to those related to the question itself. And by the way, the

www.breakingthirty.com

implicit tip here is: do ask questions! Do not be afraid of looking stupid just because you want more information or clarification. It is likely that other people in the room also need additional information and clarification.

WOMEN IN SECURITY MAGAZINE

49


ABIGAIL SWABEY Co-founder Source2Create

Are we doing enough? For years now, I’ve been working on finding as many

the roles – and the company finally started to see a

ways to elevate women within the Australian security

difference in the diversity of the applicants.

market. In that time, I’ve been asked for all kinds of things – some stranger than others – but several requests have really hit a nerve with me. Those are the ones that made me wonder: despite everything that I try to do – and groups like AWSN and others do – it is really going to make a difference? Job specifications are a good example. I get job specs sent to me more often than I can say, along with requests to help figure out how to find more female applicants.

To answer this question, let me direct your attention to the Gender Decoder – a text parser that analyses job ads (or other text) for hidden biases that many people often use, quite unconsciously, in their writing. Paste your text into the Gender Decoder and it will highlight the “linguistic gender-coding” that, research has shown, “puts many women off applying for jobs advertised with masculine-coded language”. Words like ‘active’, ‘adventurous’, ‘confident’, dominant’, ‘impulsive’, ‘superior’, ‘self-confident’,

“I have had this job spec out in market and also

‘independent’ and dozens of others, it turns out, are

pushed through a recruiter for several weeks,” one

often used in writing job descriptions and create an

cover letter said, “and we had one female applicant

overall sense that a role has been intended for men.

for this position out of 32. How can I increase the diversity within our company, if I can’t even get females to apply for positions in my team?”

A landmark 2011 research paper explored the strength of these associations and their effect on perceptions of written communications – and found

But is the real issue the job spec – or are we women

that women interpreted jobs written with masculine-

doing ourselves a disservice because we don’t think

coded language as being less appealing, and that

we are good enough?

they didn’t belong in those occupations.

To try to get an answer, I put this job spec to the

There are feminine-coded words, too – words like

test. I sent it to several individuals within the security

‘compassion, ‘emotional’, ‘inter-personal’, ‘pleasant’,

community who are well versed in job hunting. These

‘quiet’, ‘submissive’, ‘flatterable’, and ‘tender’.

are people that I highly respect, and trust to tell me how I could advise this company without the BS. The instant feedback said it all: • I see many issues with these job descriptions, and why they just aren’t appealing for women • I would never apply for this job. • The language used sounds like this role is for a man. • The list of certifications and education required would put anyone off and is not necessary. Some of these esteemed individuals took valuable time to rewrite the job description and advise on

50

So, what was different?

WOMEN IN SECURITY MAGAZINE

By now, your blood is probably boiling as much as mine was. No wonder employers are having so much trouble attracting women to cybersecurity jobs that would, if they weren’t put off by the job description, suit them to a T. This is just one scenario, and I could share many others. I recall an answer one woman gave while sitting, a while back, in a mixed panel session about increasing representation of women in security.


C O L U M N

“If I can’t tick 9 out of 10 requirements on a job spec I

And that’s just the people entering the company –

won’t even apply,” she said – compared to the male on

say nothing of the need to promote women vertically

the panel, who said “If I get to 3 I’m good”.

to add the invaluable voices of diversity to the way

Are we women our own worst enemies – setting our expectations too high and avoiding applying to jobs when we should just apply and see how we go? Have we simply stepped back and allowed the market to skew towards men in roles that we want, on the stage that we should be on? Or is it, despite all the hope, truly a man’s world and we are just along for the ride? Throw in a very real disconnect with the recruitment community – who often contact me completely unaware about who they can reach out to within our community to talk about their roles – and it’s completely understandable why Australia’s cybersecurity community has struggled to access a

the company is positioned with stakeholders and customers. Big change starts with small changes – and if your company is reaching out to fill up cybersecurity positions, I urge you to take the time to get the job specifications correct. Make sure that you focus on what the job involves, rather than using exclusive language that may prevent many otherwise talented applicants from even updating their CVs. I don’t know all the answers, but I do know that if we start by being more self-aware – all of us, both recruiters and job-seekers – then we can make a great start towards a more inclusive world. What do you think we can do to fix this situation?

pipeline of qualified candidates.

WOMEN IN SECURITY MAGAZINE

51


DO YOU WANT YOUR VOICE TO BE HEARD?

Contact us today to find out how you can become an industry contributor, no matter the level of experience.

REACH OUT NOW


SAI K. HONIG

A CYBERSECURITY CAREER PERSPECTIVE FROM A MULTIPOTENTIALITE by Sai K. Honig, CISSP, CCSP

I came into cybersecurity through indirect means.

Before I go any further, here is the definition of a

Many people who come into cybersecurity have a

multipotentiality:

computer science degree, are familiar with several coding languages, have built systems or run tools. They may even have participated in several hacking events such as “Capture the Flag” or attended conferences devoted to hacking.

“An educational and psychological term referring to a pattern found among intellectually gifted individuals. Multipotentialites generally have diverse interests across numerous domains and may be capable of success in many endeavours or professions. As a

I don’t have a degree in computer science. I do know

result of their diverse interests they are confronted

some coding languages. I like to teach others about

with unique decisions..”

security practices, and to teach technical and nontechnical people about technology architectures or software design. I even like to speak to members of the public about keeping safe online. Everything I learned about cybersecurity, I learned through my own study. Lots of reading. Lots of diving into systems and looking around. My journey to cybersecurity may not have been a conventional one., but I have abilities that many in our field do not possess. That’s because I’m a multipotentialite.

Cybersecurity is my third career. I had studied and worked as an aerospace engineer, then studied and worked in finance and accounting. I enjoy learning, so cybersecurity is a great profession. I am constantly learning to stay current with new challenges. To be fair, I was introduced to aspects of cybersecurity as a young person. I learned to devise cryptographic ciphers so I could hide messages I sent to my friends. I was introduced to coding in high school.

WOMEN IN SECURITY MAGAZINE

53


“Getting recognition as a cybersecurity professional is not easy – especially if you came into cybersecurity through indirect means”

It took a bit of time for me to realise that I do have much to offer as a cybersecurity professional. After a term as a board member of (ISC)2, I cofounded the New Zealand Network for Women in Security which seeks to encourage the

When working as an aerospace engineer, I had to send complex drawings securely. That’s when I learned about encryption and networks. I came into cybersecurity by accident. I was working as a financial auditor. As it turns out, financial systems are IT systems., so many of the things I had to review were technical controls. My engineering background helped me to understand systems.

advancement and capacity of women involved in all aspects of the New Zealand security industry and community, through the exchange of information and the cultivation of productive relationships. I also volunteer with the Black Cybersecurity Association, a non-profit organisation focused on building community, mentorship and job opportunities

My financial background helped me to understand

in cybersecurity for under-represented minorities.

controls.

I am also on Cloud Security Alliance’s Asia Pacific

Eventually, I transitioned to an IT auditor role.

Research Advisory Council whose purpose is is to

This required me to understand how systems are built, to understand access control, data lifecycle management, network and software security, web and mobile security. Every time I looked at a new system,

provide high level advisory, guidance, directions, ideas to CSA APAC-driven research initiatives (e.g. Working Groups, projects, events, outreach) with a collective APAC voice.

I had to learn about that system, its purpose, its design and how it was being used. I became interested in cloud technology because it is very much a democratised technology that enables anyone to build systems and services, but security is sometimes an afterthought. So, I became interested in the security aspects of cloud technology. I also believe my work experience outside of cybersecurity helps me to understand the need for practical approaches. Too often, policies or standards are quoted without an understanding of how to apply them practically. Also, since I started out as a nontechnical person (finance and accounting), I can talk about technology (and the need for controls) in a manner that can be understood. Getting recognition as a cybersecurity professional is not easy – especially if you came into cybersecurity through indirect means. Despite all the study and hard work, I had people tell me to my face that I was not a cybersecurity professional. There was even a time when I wanted to quit the profession.

54

WOMEN IN SECURITY MAGAZINE

www.linkedin.com/in/saihonig/ NZNWS www.newzealandnetworkforwomeninsecurity.wordpress.com BCA www.blackcybersecurityassociation.org


MISSED OUT? IF YOU MISSED THE 2020 AWSN WOMEN IN SECURITY AWARDS YOU CAN WATCH IT NOW ON OUR YOUTUBE CHANNEL!

WATCH NOW


MELANIE NINOVIC

ADVICE ON JOINING THE INFOSEC INDUSTRY by Melanie Ninovic, DFIR Consultant, ParaFlare.

Credit: consultancy-me

56

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

The past few years in cybersecurity have been

Once you set these objectives, you can start focusing

everything from eye opening and rewarding to

on the skills you need to achieve them. When you

downright challenging. There have been challenges

focus on one or two related areas at a time, you are

you cannot begin to prepare for, even though you’re

likely to grasp them more efficiently and effectively.

ingesting copious amounts of new information every I’d like to offer some advice I wish I had been given at

TECHNICAL ABILITIES VERSUS SOFT SKILLS.

the start of my career. Hopefully it will provide some

Technical abilities will give you opportunities in the

day. I’m fairly new to the world of cybersecurity and

tips to anyone looking to join this industry.

YOU WON’T KNOW EVERYTHING. Take a look at the graphic below. Each time I come across it, I am overwhelmed by the range of disciplines in this industry. It’s quite common for people to become experts in one field, for example, digital forensics, and have knowledge in another field, such as penetration testing. Some of these disciplines go hand in hand. It’s useful for a forensic practitioner to think like a hacker, by learning how to exploit vulnerabilities. However, this is not a requirement for a career in forensics. It is easy to fall into the trap of striving for accomplishment in multiple domains. Trying to learn all there is to know about cybersecurity would be almost impossible. My first piece of advice is to understand, within your first year or two, where your interests lie, and how you want your career to progress.

cybersecurity industry, but are by no means the only skills you should focus on. Each security domain requires the following soft-skills, and I would argue that you would not last very long without them. Communication: how to speak and present professionally and effectively to your colleagues, manager and, most importantly, your clients. Collaboration: you will almost always be working in a team, assisting with reviewing your colleagues’ reports, and collaborating towards a common goal. Writing: writing reports and status updates is the pinnacle of a digital forensics and incident response, red-team/pentest, or governance, risk and compliance engagement with a client. Your findings must be communicated in a way that can be understood by both technical and executive level stakeholders. Business Acumen: knowing the drivers of a business, being able to present a case for new security tools or training, or advise clients on how to improve their

Henry Jiang: https://www.linkedin.com/pulse/map-cybersecurity-domains-version-20-henry-jiang-ciso-cissp/

WOMEN IN SECURITY MAGAZINE

57


security team and posture are all useful attributes

presentations and speaking with people who have

you can bring to an organisation.

more experience than I has assisted my professional

There is a place in cybersecurity for everyone, whether you have formal security training or not. This industry spans numerous, distinctive domains.

development in ways that would not have been possible during work hours. These activities were directly responsible for me landing a new job.

It needs professionals with diverse educational and career backgrounds.

BURNOUT IS REAL. According to healthguide.org, burnout can be defined as: a state of emotional, physical, and mental exhaustion caused by excessive and prolonged

We all have our different paths, challenges, hurdles and timelines. There is no point in comparing yourself to others. More important, is that we are all working towards the same goal: improving the security of those around us.

stress. It occurs when you feel overwhelmed, emotionally drained, and unable to meet constant demands.

Community: There is a curated list of Asia-Pacific

It is a common problem in the cybersecurity industry,

information/cyber security meetups here. I also

because we often feel the need to push ourselves

recommend the Australian Women in Security

to learn as much as we can. Even if you take the

Network (AWSN), and there’s a list of Asia-Pacific

sensible approach of focusing on one skill at a time,

infosec conferences here.

you can still suffer the effects of burnout. Studying on top of everything else in life — work, family, hobbies — can be overwhelming.

Online Learning Resources: As part of my InfoSec 101 series, I’ve provided a small inventory of places to start learning online. Most of these resources are

It is important to recognise the signs early on and

free. For more practical challenges such as capture

take preventative measures as soon as possible.

the flag events and running your own virtual machine,

The signs are different for everyone, and the site I’ve

have a read of this post.

linked to above does a good job at detailing them. It’s important to be transparent with your employer too, to ensure you are given time to recuperate and rest.

GET INVOLVED. Before landing my first full-time security-related role as a security operations centre analyst, I had spent the previous year studying to my heart’s content. I knew, without at least some knowledge of important security concepts, I would be unable to land an

We all have our different paths, challenges, hurdles and timelines. There is no point in comparing yourself to others. More important, is that we are all working towards the same goal: improving the security of those around us. Whether you decide to join the industry tomorrow, or next year, I hope this article helps you to manage your expectations, and I’m happy to answer any questions you may have. www.linkedin.com/in/melanie-cybers/

interview. There is an abundance of online resources that can help develop and fine-tune your skills, and an

www.darkdefender.medium.com/

online and physical community where you can meet like-minded individuals. Of course, this isn’t a necessary part of your job, we all have lives. However, I have found watching

58

WOMEN IN SECURITY MAGAZINE

twitter.com/_darkdefender_


Easy Reliable Resourceful No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY!

charlie@source2create.com.au | aby@source2create.com.au

www.source2create.com.au


Aspiring Women in Security CISO Masterclass The Australian Women in Security Network (AWSN) in partnership with The Security Collective are excited to offer an exclusive short masterclass aimed at women who are aspiring to be Chief Information Security Officers. The CISO masterclass will provide both group and 1:1 coaching sessions for participants to understand potential career paths to CISO roles and to set goals for their own career progression. Starting 23rd March, 2021

Visit awsn.org.au for information about exclusive events, programs, and content. Join Australia's largest community of women in cyber and physical security. 60

WOMEN IN SECURITY MAGAZINE


MIN KYRIANNIS

ELISA MULA

THINGS TO REMEMBER FOR WOMAN IN TECH by Min Kyriannis, Diversity in Security & Technology Champion & Elisa Mula, Inclusion Advocate in Security

Being a woman working in technology or security has

did not have the right viewpoint? There are so

its challenges. And if you started when the workforce

many beliefs ingrained into every individual that

was predominantly male, it was an uphill battle to be

influence our behaviour, often unconsciously.

viewed as an equal. We have spoken to many women,

They take away our self-esteem and confidence.

from the feedback we’ve received we’ve compiled

Only recently have we started seeing more

some useful advice.

diversity in technology industries, which fosters

So, if you are feeling stuck, underappreciated or angry, here are some recommendations from women in our industry to help boost your self-esteem and garner the recognition you deserve. 1. Never lose confidence in your ability and yourself. How many times have you felt intimidated by your male colleagues? Have you felt you could not compete with a male colleague, or you were not smart enough, or

a different mindset. So never lose confidence in your ability and your belief in what you are capable of. 2. You do not have to justify your expertise. Women are continually fighting for their voices to be heard, or for seats at the table. Many women claim to constantly feel the need to trumpet their accomplishments in order to be respected by their leaders and their peers. One effective way you can deal with this is by finding a supportive

WOMEN IN SECURITY MAGAZINE

61


If you started when the workforce was predominantly male, it was an uphill battle to be viewed as an equal.

advocate for diversity in your organisation.

6. Give credit where it is due. We all hear horror

They will reduce the pressure on you to justify

stories about people having their ideas stolen

your existence and prove your worth. Simply

by their peers. When you give credit to your

having that person in the room can change the

colleagues, it builds your own integrity and

dynamics and make you less defensive.

reputation as an ethical team player. Falsely

3. Feel proud of your accomplishments and do not shy away from promoting yourself. You have accomplished something amazing! Be

claiming credit is all to frequent in a world where everyone is striving for advancement. 7. Be empathetic. Women are much better than

proud of it and announce it. Why hide it? You

men at reading people. Use that emotional

should embrace the accomplishment and let

intelligence, it will serve you well. When you see

people know what you have done. Often we

someone in need in the workplace, offer your

see men talking about their accomplishments

assistance.

and getting high fives. Women do not always get the same level of acknowledgement from contemporaries and shy away from making such announcements. But they are important for building your ‘brand’ and demonstrating your credentials. Make sure you broadcast your achievements and gain recognition for them. 4. Never Stop Learning. Avoid stagnation, and move with the times. Continue learning, listen to new ideas, read, and brainstorm your future. When you stop dreaming, you stop evolving. 5. Create a network of people you can speak to.

8. Be kind, have integrity and have fun. It has been scientifically proven that your brain functions better when you are in a good mood. When you are kind to others, you are being kind to yourself. Practicing a positive attitude can be one of the best ways to further your career and improve your quality of life. But most importantly, enjoy your work and have fun. This will further your self-development and creativity. These are not skills solely for women in security or women in technology. They are for every professional, for anyone looking to stay on the right track. But

For some women one of the hardest things in

women need to keep reminding other women of

male-dominated industries is finding people

these points. So send this today to a woman you

to connect with. Communicating with your

know who might need to read it!

community helps build your network and is extremely important for your professional

www.linkedin.com/in/mkyri/

development. It’s most important to reach out to people, to collaborate, to learn new things, and gain supporters and advocates.

62

WOMEN IN SECURITY MAGAZINE

twitter.com/mkyri3


Committed to creating, promoting and growing cyber security careers for all women.

cybercx.com.au/careers


MARIANE C LOUVET

INTRODUCE YOURSELF TO LEADERSHIP, THE POWER OF A STRONG NETWORK AND CONNECTIONS by Mariane C Louvet, Channel leader - Cyber Security Over the past 20 years I have come to a realisation:

and to give me confidence in this new role. He

a title is just that, a title. It refers to a human being

introduced me to all of our partners and one thing I

with a function in their industry. We get hung up about

realised quickly was that relationships were key to

hierarchy and about who we are supposed to engage

success. I found ways to connect with our partners

with, or not.

and our vendors by engaging with them on topics

I was 23 and my career goal was to become a fashion buyer; I had taken college courses in fashion

senior leadership at events and during meetings.

merchandising and had plans to travel the world in

Within my first year in the role, I had won an award

search of the latest and greatest in apparel trends,

for top sales assistant, and as a team we won the top

until a market crash changed my destiny. Instead

sales award. Seven years later I had become a sales

I took a job as a sales assistant at a technology

rep with a sales assistant of my own.

distributor. Technology was an industry I knew nothing about, and had no interest in, but it paid well. So I jumped on it. My first manager should have been a stand-up comic, which made my job not only fun, but interesting. He made certain to take the time to help in my training

64

other than technology, and I presented myself to

WOMEN IN SECURITY MAGAZINE

I took a break from IT to raise my daughters. I kept in touch over the years with my partners and with vendors and stayed on top of technology trends and industry developments. The president of one of my old partners reached out to ask if I would be interested in a role supporting a


C A R E E R

P E R S P E C T I V E S

vendor from overseas, part time. He thought I would

ladder, to let them know I was available. I had four

be a great fit. Within a few weeks I had connected

offers. The hard part was deciding which one to take.

with their leadership team and introduced myself to

I opted for a director role at Forcepoint

them. I spent four years rebuilding and expanding my network and reconnecting with the industry.

Networking is not hard, however, you have to know how to approach people. I had the pleasure of

An opportunity came up as an executive account

attending an incredible charity event in New York

manager at Symantec, and during my new hire

in November of 2019. Dress for Success (a global

training at our corporate HQ, I made sure to listen

not-for-profit organisation that empowers women

carefully when leaders were speaking and reached

to achieve economic independence) had a fireside

out to many upon my return with questions on their

chat and their fearless, classy CEO, Joi Gordon made

presentations. This created visibility for me. Over

time to speak with me because I had sent her an

my six-year tenure I made sure to approach C-level

introductory email prior to attending. I also had the

executives at our sales kick-offs and at various

opportunity to chat with renowned US television and

industry events, in the hope they would offer me

online journalist, presenter, producer, and author, Katie

opportunities to grow my career.

Couric. These amazing women are now part of my network. All it took was a simple “hello” and some conversations.

“A title is just that, a title. It refers to a human being with a function in their industry. We get hung up about hierarchy and about who we are supposed to engage with, or not.volupicte cus aut ad”

Over the years I have created numerous connections, and many have become mentors, friends and part of my daily life. It does not matter if someone is C-level, SVP, senior- something or other. Those are just titles.. Doing your homework on who they are and what they do, and finding common interests are all great ways to start a conversation. I have no issue

I then decided I wanted to leave sales and move to

picking up the phone, texting or emailing anyone in

the channel. We were launching a new division and

my network to say hi, to recommend someone, to ask

they were looking for a leader to support the Canadian

a question, or to congratulate them on their success.

market, so I approached our SVP of global sales and told him I wanted the role. I then connected with the VP for EMEA who would be running my team. It took some time, but I was persistent, took a leap of faith and moved to our brand-new cloud channel team. I spoke with our CIO at an executive briefing in California and mentioned what I was doing. She was very supportive. Once again, had I not taken the time to get to know these people, I might have missed a

My nicknames over the years have been “fast talker”, “411”, or the “networker”. I embrace them all. They have opened doors for myself, my family, and friends; as much in my personal life as in my professional life. A final reminder that a title is simply a title. At the end of the day, effective communication and knowing who you are approaching are all it takes to make strong connections and create a solid network.

tremendous opportunity. When I was looking for a new position a little over a

www.linkedin.com/in/mariane-louvet-94340a6/

year ago following the sale of Symantec’s enterprise security assets to Broadcom, I reached out to my network, including some at the top of the leadership

WOMEN IN SECURITY MAGAZINE

65


HARPREET KAUR NAHAR

SECURITY IS NOT JUST ABOUT HACKING by Harpreet Kaur Nahar, student at Edith Cowan University

There are several misconceptions held by individuals

SECURITY - A BROADER PERSPECTIVE

seeking a career in security. Most, especially

Many people see the terms ‘hacking’ and

women, abandon their aspirations to be a security professional because they believe a security professional must be an expert in coding. However, this is not the case.

‘cybersecurity’ as synonymous, but that’s not the case. Although hacking and cybersecurity are related, they are quite different disciplines with different career options. However, the skills required for each,

When I entered cybersecurity, I chose to study

and for most technical cybersecurity jobs, are similar.

for a master’s degree in cybersecurity because I

Let’s talk first about hacking. Hacking refers to

aspired to becoming an ethical hacker, not because I found penetration testing interesting, but because I believed ethical hacker to be the only career option for a graduate in cybersecurity. When I explored the available study units in my master’s course, I discovered my degree course could give me other options for a career in cybersecurity.

gaining unauthorised access to a system. Hacking is illegal when undertaken by a cyber criminal, and ethical when undertaken by cyber professionals with written permission from the organisation being hacked. Ethical hackers look for vulnerabilities that could be exploited by cyber criminals in order to prevent such exploitation. Ethical hacking is what most non-cyber people see as being the role of the cybersecurity professional. However the role is much wider, and there are many career paths in cybersecurity. Here are some of them.

66

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

z IT SECURITY SPECIALIST The responsibility of an IT security specialist is to provide support to the security features of IT systems, and immediately respond when a security incident occurs. The essential skills required to be an IT security specialist are in-depth knowledge of computer networking concepts, and an understanding of operating systems such as Windows and Linux. IT security specialists may hold one of several different job titles, including: • Information Security Specialist • Cyber Security Specialist • Network Security Specialist • Computer Security Technician z IT SECURITY ANALYST IT security analysts need great experience and strong analytical skills in order to understand systems in depth. A common job title for in IT security analyst is penetration tester. Others might be: • Compliance Analyst • Incident Response Analyst • Intrusion Detection Analyst • Vulnerability Analyst • Audit Analyst

systems. Common job titles for IT security consultant include: • Information Security Consultant • Computer Security Consultant • Database Security Consultant • Network Security Consultant • Cyber Security Consultant z IT SECURITY ENGINEER IT security engineers are the technical experts who build security systems and solve complex technical security problems. Their job is to install, configure and troubleshoot security infrastructure. Common job titles for IT security engineer are: • Network Security Engineer • Information Assurance Engineer • Information Security Engineer • Information Systems Security Engineer z IT SECURITY ADMINISTRATOR IT security administrators are responsible for supporting security systems such as firewalls, and for anti-malware software configuration. Their job is to manually administer user access rights so only legitimate individuals can access the system. Some of the job titles for security administrator are:

z IT SECURITY AUDITOR

• Systems Security Administrator

IT security auditors play a vital role in IT security.

• Network Security Administrator

Their job is to review the status of all security controls in a system and prepare a detailed report on their findings. They must have in-depth security knowledge

• Information Security Administrator z IT SECURITY ARCHITECT

so they can understand what constitutes a highly

Security architects research and design security

secure system. Again, the role has multiple job titles,

architectures. They need the skills of security

including:

engineer and security analyst. They require many

• Information Security Auditor • Security Compliance Auditor • Information Systems Auditor

years of experience to enable them to develop complex security solutions, making them the most highly skilled professionals in IT security.

• Information Assurance Auditor • IT Auditor z IT SECURITY CONSULTANT IT security consultants are security professionals with in-depth knowledge of security technologies and great experience in security functions. They provide expert security advice and specify the technical measures an organisation should implement to secure its IT

Apart from the above roles, there are managerial cybersecurity roles. These require experience in security and network technologies. So, if you are looking for a career in cybersecurity, you will find a plethora options in addition to hacking and penetration testing. www.linkedin.com/in/harpreet-kaur-nahar/

WOMEN IN SECURITY MAGAZINE

67


ANOORADHA GOEL

WHY CYBERSECURITY AS A CAREER? by Anooradha Goel, Security is everyone’s responsibility As technology grows so do the risks associated with

who can provide those solutions. As a cybersecurity

it: each new wave of technology brings new risks.

professional you will be constantly learning, working

Cybersecurity professionals must identify, understand

with companies that would further help in your career

and address these risks.

growth and a development.

The role of cybersecurity professional covers a wide range of responsibilities, but it can be summarised as being to protect online data from compromise. With ever more personal information being stored online, cybersecurity professionals play an increasingly

Because you’ll possess highly-transferrable skills that companies need, a variety of opportunities will be available to you in many different industries around

important role.

the world. As digital technology evolves and as

EXCITING CAREER PROGRESSION OPPORTUNITIES

for cybersecurity will increase. As a cybersecurity

Cybersecurity offers a broad range of opportunities

finance, or in the media.

for professionals from different backgrounds. Entry

more companies become dependent on it, the need professional you could work for technology giants such as Google and Facebook, in retail, banking and

include systems administrator, web developer,

A MENTALLY AND FINANCIALLY SATISFYING CAREER

IT technician and computer software engineer.

For students and professionals who are naturally

level IT jobs that can lead to a cybersecurity career

Common career paths from these roles lead to those of security architect, security manager, penetration tester or chief information security officer (CISO).

GREAT JOB SATISFACTION The world of cybersecurity is evolving, hence great demand for solutions for the new upcoming problems. . Companies are willing to invest in people

68

THE WORLD IS YOUR OYSTER

WOMEN IN SECURITY MAGAZINE

curious and inclined towards pursuing a career in software and technology, cybersecurity offers an unmatched opportunity to work in a dynamic environment, and be paid handsomely. Cybersecurity has been one of the hottest professions for many years. Companies across the globe are targeted continuously by cyber attackers.


C A R E E R

P E R S P E C T I V E S

them is massive, and unmatched in any other

ELIGIBILITY FOR A CYBERSECURITY CAREER

technology domain.

A relevant technology degree and knowledge about

Data is the main entity organisations in every

basic and/or advanced cybersecurity concepts

Demand for cybersecurity professionals to protect

industry strive to protect. Compliance requirements and security approaches vary from company to company and from industry to industry, but for all the ultimate goal is to ensure confidentiality, integrity and

would make a good starting point for a career in cybersecurity. However, the rise in cyberattacks is increasing the opportunities for professionals from all backgrounds who want to make a career in

availability of data.

cybersecurity. So you can start a cybersecurity career

Organisations deploy people, processes and

background is your approach to cybersecurity, and

technology to achieve this goal. Cybersecurity professionals develop, configure and troubleshoot a variety of technologies such as encryption, firewalls, intrusion protection, advanced malware protection, network analytics, and processes like identity and access management and authentication. Many organisations are required to implement specific data protection measures to ensure they comply with regulations. Organisations’ cybersecurity requirements create many opportunities. They require process managers and auditors of security controls. They need governance, risk management and compliance (GRC)

regardless of your background. More important than how you do the job of protecting data, analysing threats and preventing attacks. Your first step should be to acquire basic cybersecurity skills. Then choose a specific domain based on your personal interest and market demand. You’ll need to undertake in-depth training, develop skills, and acquire specific certifications in security. You can then build your expertise in niche areas through targeted certifications. You will never be bored in cybersecurity. You will always have scope for growth, and for continuous learning. New challenges will pop up and you will

professionals and legal experts, incident response

encounter new people, situations, and opportunities.

people, forensic investigators, threat analysts,

What more could you ask for in a career? Dive in now.

developers, IT operations staff and security architects.

Get inspired and keep learning.

WOMEN IN SECURITY MAGAZINE

69


NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

C O L U M N

How parents can keep up with apps and online games Have you ever clicked into Apple’s App Store or Google Play Store and been thoroughly amazed at the number of apps there? At the touch of a button your tween/teen could download any app their heart desires. It’s nervewracking, knowing some of these apps and online games have hidden dangers. You’ve heard other parents talk about situations you never want your child to find themselves in, and you’ve read dozens of media reports on dangerous apps. The good news is you don’t have to be across ALL those apps and games, just the ones already installed on your child’s device and the ones they ask to download. Here are 10 tips to help you decide which apps are OK for your tween/teen. 1. Know what apps and online games your kids are currently using/playing/have downloaded. 2. Make sure the settings on your child’s devices block them from downloading apps without your permission. 3. Check the game ratings in the App Store/Play Store. 4. Understand the basic functionality of apps and online games. For example, does the app allow anonymous chats, private/public groups? Does it contain frequent swearing, nudity or encourage gambling? 5. Download the app/game yourself to get a better idea of what it does. Use it yourself. Then sit with your child and play.

70

WOMEN IN SECURITY MAGAZINE

6. It’s OK to tell your child that, although an app looks safe for their age, you just aren’t sure about it. Explain why. Suggest downloading a game they want and playing it with them so you can make a final decision. 7. Consider your child’s maturity. Have you educated them about online safety? Do you already have rules around the use of apps and social media platforms? 8. Make sure you have turned on the setting that prevents your child from re-installing deleted apps. (Settings > iTunes & App Store purchases > tap to turn off) 9. Have a list of reliable sources you can consult. Great websites to bookmark are https:// www.esafety.gov.au/, and https://www. commonsensemedia.org/. 10. Google can be your friend. A few searches on Google can confirm whether or not an app is one you want your tween/teen to be using. Remember – you are the parent guiding your child’s online activities. There will be times when you will need to loosen the reins and times when you will have to give a flat out ‘No’. You know your tween/teen best. So follow your feelings.

www.linkedin.com/in/nicolle-embra-804259122/ www.thetechmum.com www.facebook.com/TheTechMum

www.pinterest.com.au/thetechmum


INDUSTRY PERSPECTIVES


NANCY BENJUMEA

BEHIND THE SCENES WITH AN ICT WOMAN UNDER COVID CONSTRAINTS by Nancy Benjumea, Data security analyst and amateur writer It is not easy to dredge up your unpleasant memories, and harder still to then share them with many people. So, imagine you are sharing them only with yourself. Today I want to share the work-from-home experience of a migrant woman living alone, and relate how the pandemic tested my strength in ways I have never previously experienced. 2020 wasn’t an easy year for anyone. Our lives changed dramatically. We were forced to re-invent our daily routines and accept that we could no longer go outside whenever we wanted. I know families with children for whom working from home was very challenging, because they were trying to juggle their jobs and help children with schoolwork. Parents working from home or in an online meeting need to be very creative to keep children occupied. Working from home myself, I thought there was something wrong, but could not put my finger on it: loneliness, uncertainty, fear, confusion, mixed emotions, and being unable to share with a loved one. But, as an ICT security woman, part of my job is to investigate, to find root causes when security incidents happen. So, I applied the same methodology to understanding why I felt as I did. I was not prepared for a pandemic, for having restrictions imposed on my life, for having a constant invisible threat increasing my anxiety.

72

WOMEN IN SECURITY MAGAZINE

I read many articles about how to deal day-to-day with the new normal by exercising, sticking to a routine, etc. But what helped me most was being able to acknowledge that I was fully entitled to have all those feelings, especially sadness after losing my job last August! I searched my soul. I accepted I was mourning because I had lost my freedom and my job. By acknowledging my circumstances I started my healing process. This awareness was gold. I am still struggling, facing daily challenges and moving slowly forward. But hey, I am part of this big group called ICT Women, brave girls that even in their darkest moments can find hope. Sometimes our vulnerabilities make us forget we are women who aspired to work in technology. We were empowered to advance our careers and personal lives, and we succeeded. We are brave and strong, but if one day we are not very strong or very brave it is OK to stop, breathe, maybe cry, and start again. In security, we recommend having at least three backups to protect organisational data; one on-site, another off-site and the third in the cloud. Do the same. Have backups for your own life, look for help, talk with friends, nourish your soul. Then you will be ready for every new day. www.linkedin.com/in/nancybenjumea/


KAREN STEPHENS Karen is CEO and co-founder of BCyber, an agile innovative group who works with SMEs to protect and grow their business by addressing their cybersecurity and governance risk gaps by demystifying the technical.

C O L U M N

Tales from the trenches In 2020 COVID-19 paid us a visit and wrought changes at a speed few expected. The cyber community will remember 2020 as the year when “cyber” became a business issue rather than an “IT problem”. With an increased focus on all things cyber, many cyber professionals can expect to find themselves fronting a board or senior management whose idea of cybersecurity starts and stops with “user support”. It will take time for cyber professionals to be considered trusted, essential advisors and not merely a cost centre, but here are somethings to remember. •

safety education program that never changes helps the cybercriminal. It needs to be fresh and

Understand your audience. What is the level of

relevant, so its lessons become second nature.

their technical knowledge? What is important

It’s when people are preoccupied, stressed or

to them and/or the company? Then tailor your

generally “under the pump” that they fall for a

message. For example, don’t use technical terms

seemingly basic phishing, vishing or smishing

nobody but a security analyst understands.

(respectively a voice or text message-based ploy

To some, a bad actor is a NIDA dropout, not a

to gain personal information) attack.

cybercriminal. •

Demystify the connection between IT investment and the advancement of your corporate strategy. The board needs to understand both your relevance and your ability to support the overall business strategy.

Provide live examples that show how breaches can affect a business in your industry. This helps contextualise the importance of cybersecurity. Learn from the mistakes of others rather than waiting until you have your own breach to learn

www.linkedin.com/in/karen-stephens-bcyber/ www.bcyber.com.au karen@bcyber.com.au

from. •

Zero trust is not a reflection of a bad corporate culture; it can be a smart business decision. Insider threats are real, just ask Landmark White.

twitter.com/bcyber2 youtube.bcyber.com.au/2mux

Empower all levels of the business to be a strong first line of defence. For example, running a cyber WOMEN IN SECURITY MAGAZINE

73


QUEEN A AIGBEFO

DRIVING A SLOW CAR FAST AND DRIVING A FAST CAR SLOW by Queen A Aigbefo, Research student, Macquarie University

In the world of motorsports every racetrack is

and respond to cybersecurity threats and attacks.

different, but race car drivers can increase their

A security arsenal — robust like a fast car, or limited

chances of winning if they have a great team,

like a slow car — may not guarantee the security of

finance, talent and ‘luck’. In cybersecurity, the same

organisational information assets.

attributes can ensure the security of organisational information assets. But, like a racetrack, the security environment incorporates many challenges. Navigating the cybersecurity threat and attack circuit may require more skill than we possess, because we will encounter many unexpected twists, turns and

the security tracks with their never-ending twists, turns and obstacles, and rely on some of the same attributes that make for a successful motorsports team.

obstacles.

SPEED

Top speed does not always guarantee a win; the

The global pandemic in 2020 increased our

ability of a talented race car driver to skilfully handle a fast car or a slow car will often determine victory. As security practitioners, we possess different skillsets and use a diverse range of security tools, tactics, techniques and procedures to mitigate risk

74

Security professionals need to skilfully navigate

WOMEN IN SECURITY MAGAZINE

dependence on technology as well as our susceptibility to security threats and attacks. Irrespective of the size or quality of your security arsenal, you will need rapid response to keep a threat or attack under control. Speed is also necessary for


I N D U S T R Y

P E R S P E C T I V E S

learning about and implementing new technologies

helps to enlighten the security practitioner on the

in the face of rapidly evolving threats. Your ability

cause of a security problem. Top management

to respond to an event, or to implement necessary

interaction is vital to get security buy-in. However, the

security measures, will depend on your knowledge

various business units and non-technical users who

and on the ability of your security specialists to work

interact within the organisation should not be left

as a team.

out. Every node within the organisation from physical security to cyberspace can contribute the security

KNOWLEDGE

data needed to create a reliable security program.

Speed without knowledge may not produce the appropriate outcome, and vice versa. Attacks may occur in rapid succession. Without the know-how to respond, mitigate, or contain a security event, speed becomes a disadvantage. Because the security terrain is always evolving, learning is essential. Additionally, a thorough knowledge of the security resources and tools at your disposal Improves your chances of responding rapidly and appropriately to any security event.

TEAM INTERACTION Security is everybody’s business. Sometimes a race car driver driving at over 200km/h may not be able

I love the world of motorsport and can relate to the adrenaline rush on race day. As security practitioners, we live with a somewhat similar adrenaline rush. Every day is unique; speed is always present, knowledge acquisition should be continuous, and team interaction forms the glue that helps the security practitioner drive a fast car slow or drive a slow car fast. www.linkedin.com/in/queenaigbefo/ twitter.com/queenaigbefo

to analyse the cause of a problem. Team interaction

WOMEN IN SECURITY MAGAZINE

75


(CYBER) SECURITY CULTURE EATS (CYBER) SECURITY STRATEGY FOR BREAKFAST on government, business and the community. The recommendations made are all great, however, achieving the desired outcomes will be challenging

Jacqueline Jayne Security Awareness Advocate, KnowBe4

IT

nation go about creating a (cyber)security culture to support the strategy.

THE MISSING LINK IS THE HUMAN ELEMENT. professionals around the world have some thorough and detailed frameworks and guidelines to use when it comes to developing a robust information security strategy, but there is one thing

missing – the human element. The cyber threat landscape is out of control across the globe and organisations can’t seem to get ahead of the curve. Cyber attacks are increasing as cybercriminals are

Protecting systems and information is the core purpose of anyone working in the information security world, which includes cybersecurity. Yes, some people see these as one in the same and others see them as separate disciplines, but that’s a discussion for another day. Today, we are looking at the human operating system and what you can do to attract its attention, raise curiosity, get buy-in and have yourself a powerful culture of (cyber)security in your organisation.

becoming more and more sophisticated and their

Context and understanding are important in this

methods are quite frankly abhorrent. They continue

process, so let’s start with some definitions.

to target our human vulnerabilities and leave a trail of destruction in their wake without a care in the world.

76

if there is no clear way forward as to how we as a

Strategy is tangible and visible with clear guidelines. It’s the road map, the plan, the goals, the logical

Most organisations have a well-documented

process of taking us from where we are to where we

cybersecurity strategy. The Australian Cybersecurity

want to be. A place where outcomes are defined and

Strategy 2020 was released in August with a focus

results are measured and managed.

WOMEN IN SECURITY MAGAZINE


F E AT U R E

Culture is tacit and elusive in its very nature. It’s

if not defined, is formed by the people, their attitudes,

often unspoken, based on behaviours, hidden in the

values, unconscious bias and overall approach to the

thoughts and minds of people. We have all heard

world. Unchecked, group thinking emerges, silos form

things like ‘the behaviour you ignore is the behaviour

and if you are not careful, you may find yourself amid

you accept’ or ‘the fish rots from the head’ or ‘monkey

a toxic culture.

see monkey do’. These sayings can all describe culture. We often see the framework of culture in an organisation’s vision, mission and values which can describe the attitudes they have towards various elements. For example, do they value innovation over tradition? Observable culture is the way an organisation welcomes new employees, comes together (or not) at a time of crisis, manages performance, celebrates birthdays, responds to change and ideas or treats its customers and vendors. It is also the way you go about your day-to-day work when no one is watching which has been highlighted as we moved to a remote working situation in this year of COVID-19. Strategy is usually an annual event -- ‘here is our 2020 strategy’. The road map for the year is clear and hopefully, we all know what our role is in it. Culture,

For organisations that are about to go through a lot of change, it is going to be important for them to understand what the culture-related change is for their people. Do they embrace change, or will they fight it every step of the way? This is the very reason many strategic plans fail because the culture was ignored or dismissed as being irrelevant. Big mistake! We can have the most brilliant (cyber)security strategy the world has ever seen, and it will never be completely realised if we fail to engage the hearts and minds of the people. Before we look at how to go about creating a (cyber) security culture, let’s look at the benefits of having one versus not having one. The following examples are situational and are from the point of view of the human, your users and represent what’s going on in their minds.

Situation One – Phishing (malicious emails)

Without a (cyber)security culture

With a (cyber)security culture

OMG, an email from my bank – looks like someone has tried to illegally use my credit card. I better click on this link and update my password.

Hold on a minute, I know what red flags to look for that could indicate a phishing email and I know that I must not engage with it. I will call my bank to confirm.

This email looks suspicious, I don’t even bank with them. I’ll ignore it and delete it later.

I need to report this suspicious email to the cyber team. I better not delete it because I know they will want to look into it further.

Oh no. I don’t think I should have clicked on that. Nothing bad happened – phew.

Oh no. I don’t think I should have clicked on that. I better let the cyber team know straight away.

IT wants me to change my password again – this is getting ridiculous. I did this last week too.

Hmmm – IT wants me to change my password again and I only just changed it. This could be one of their tricky phishing tests. I think it’s bogus and I will report it using the phish alert button.

WOMEN IN SECURITY MAGAZINE

77


Situation Two – USB devices

Without a (cyber)security culture **USB found in carpark with ‘payroll’ written on it**

With a (cyber)security culture As much as I want to look at this, I am going to take it to the cyber team.

LOL – this is going to be good. I’ll take this back to my desk, plug it in and show the guys.

**Vendor comes in for a meeting and wants to plug in their USB** Yep, I will plug it in and set that up for you.

Sure thing, I will just get the cyber team to scan it first. OR Unfortunately, our cyber policy is very clear with USBs – we can’t use them.

Situation Three – Working from Home or Remotely

Without a (cyber)security culture This is cool! Now my kids can use the work computer at home!

I wish the kids could use the work computer at home. However, I know that there are too many risks associated with that.

I can use free Wi-Fi on my work mobile – this is awesome!

I better make sure the VPN is on before I connect to free Wi-Fi.

I don’t need to lock my computer at home.

Even though I am working from home, I really need to lock my computer just to be safe.

Whilst these situations seem second nature to those

the curb involves multiple steps that are hard to

of us who live and breathe information security and

remember at the beginning. Your first drive is

cybersecurity, they are not second nature to everyone

terrifying. Other cars on the road, pedestrians, street

else. I can promise you that this is exactly what your

signs, weather changes, the rear-view mirror, side

people are thinking and doing every single day.

mirrors, accelerate, brake, indicate, clutch, slow down,

A (cyber)security culture is not just completing training or reporting phishing emails. It’s the unseen and sometimes unmeasurable situations that occur and the subsequent response. A non-cyber example is driving a car. You don’t get handed the keys and told to drive safely. There

78

With a (cyber)security culture

speed up, windscreen wipers and so much more. It is only after time and practice and testing that it all comes together. Even then, there are constant reminders of the dangers and our role in keeping the roads safe for everyone. The same can be said for cybersecurity.

is documentation to read and absorb, rules to

You want a culture where your people are aware of

remember. Then there’s a process of familiarisation

their responsibility to keep things safe, the cyber

with the car itself. Preparing to drive away from

threat landscape and the tricks cybercriminals use.

WOMEN IN SECURITY MAGAZINE


F E AT U R E

You also want them aware of your policies when it

6. When it comes to the unwritten rules of conduct

comes to keeping everything secure, to understand

at your organisation, have you thought to include

what is acceptable online behaviour, how to spot the

(cyber)security?

red flags and report any potential phishing emails.

HOW DO YOU DO IT? By taking the time to define your (cyber)security expectations when it comes to the human o/s with these seven (7) questions: 1. What attitudes do you expect your people to have towards security? 2. What behaviours are you wanting to change or see?

7. Lastly and perhaps most importantly as without it you are doomed to fail – do your people understand why cybersecurity is everyone’s responsibility and that they have a critical role to play? Once you have the answers to these questions, you are on your way to developing your (cyber)security culture. Enjoy your breakfast! This article was first published in Issue 3 of the Cyber Risk Leaders Magazine 2020.

3. Do your people have an understanding, knowledge and sense of awareness? 4. How do you go about communicating with your people? Do they feel like part of the solution? 5. Have you considered and included your people in your policies, and do they know what to do?

www.linkedin.com/in/jacquelinejayne/ www.knowbe4.com/ jacquelinej@knowbe4.com twitter.com/JakkiJayne

WOMEN IN SECURITY MAGAZINE

79


RIMONDA OHLSSON

DIVERSITY, LIKE SECURITY, SHOULD BE BUILT IN FROM THE GROUND UP by Rimonda Ohlsson, VP, People & Culture at Secure Code Warrior

Rimonda Ohlsson knows diversity is key to the success of fast-growing Secure Code Warrior Secure Code Warrior (SCW) has grown rapidly in recent years, evolving from an ambitious startup into a global Australian success story by producing secure developer learning tools that have tapped into the global awareness of the importance of building cybersecurity into products from the ground up. In a similar way, Rimonda Ohlsson, the company’s director for people and culture, recognised early on that building the right culture – of inclusion and diversity, among other things – required building from the ground up, and support from the top down. That support was already present under the guise of founder and CEO Peter Danhieux, who hired Ohlsson

80

WOMEN IN SECURITY MAGAZINE

18 months ago to lay out a long-term people strategy after short-term contractors helped the fast-growing startup find its footing. Danhieux “was always about creating a new kind of people culture agenda that is modern and evolutionary and creates a place where people can be successful,” Ohlsson says, noting Danhieux’s long engagement with gender-equality efforts such as the Australian Women in Security Network (AWSN). The overall goal, she adds, is to “create a place where people can be successful, feel supported, and feel like they want to come to work every day – supporting them to be successful and not bound by rules or bureaucracy.” That culture has resonated with workers and helped drive SCW’s growth: During 2020 through the


D I V E R S I T Y

pandemic Secure Code Warrior has seen continued growth with 63 additional hires across UK, US, Sydney , Iceland, India and Belgium, bringing the total to 165 employees globally. “It has been really exciting but also very challenging,” she says, noting that after years in large institutions she had become “passionate about culture” and was attracted to the potential of “more niche businesses where I felt I could make a difference”.

COMPANY CULTURE AS A GUIDING LIGHT Her work to help make that difference has driven development of a range of initiatives specifically designed as a “north star to people” – a ‘Warrior Code’ that includes five guiding principles “that talk to the way we like to treat each other, what we stand for, and how we work together.” Ongoing awareness and engagement campaigns ensure the Warrior Code’s messaging remains prominent in the office and on the minds of employees, with whom a dedicated employee experience team engages continuously, as well as with the new recruits that the company actively courts and hires. “I’m quite creative and I like thinking in new ways,” says Ohlsson, “and I like thinking of ways that we can engage our people… I think everybody has some great ideas, and we want to involve everybody in that journey.” That sense of universal engagement pervades everyday working environment, where employees are invited to provide feedback and policies are adapted based on that feedback.

&

I N C L U S I O N

“The culture comes from the top, and then it becomes a place where everybody contributes to it,” she says. “You need to have some kind of focus in your people and culture strategy to give clarity to people – and that doesn’t mean more rules or policies. It just means having a place where they can feel and navigate their way through the business, feel supported and where they can go to talk to someone if they need to raise a problem.” SCW’s workforce is around 41 per cent female at the moment – well ahead of industry averages – and the company this year introduced initiatives such as in-office school-holiday programs for employees’ children, and a gender-neutral global parental leave policy available to all workers around the world. Yet that achievement is just a stepping stone towards an overall diversity strategy that has, Ohlsson says, been aligned “from a cultural perspective”. “We look at these life experiences that influence the way we work, how that impacts how we build our product, and the way we grow our teams.” This focus has driven engagement with organisations such as Australia’s Indigenous Literacy Foundation, as well as internal staff-development opportunities and an ongoing roster of partnerships to support workplace diversity. “We’ve gotten to where we are through diversity,” Ohlsson says, flagging the coming launch of a careers page showcasing just how diverse the workforce is. “It’s really about taking people on a journey and telling their unique stories.”

WOMEN IN SECURITY MAGAZINE

81


LAURA JIEW

THE HEROES OF AUSCERT2020 THE WOMEN IN SECURITY WHO MADE IT HAPPEN! by Laura Jiew, Events, Marketing and Communications coordinator for AusCERT, Australia’s pioneer Cyber Emergency Response Team The story is all too familiar; for millions of working

security conference in the APAC region; one that

women the COVID-19 pandemic delivered the tough

connects friends and colleagues across borders.

challenge of keeping up with the tasks of home life as well as shouldering various responsibilities at the office. For the women of AusCERT and its supporting networks, things were no different. In late April 2020 a decision was taken to pivot the annual AusCERT conference into a virtual-only event. The decision created a major challenge for the team. This is the story of how women in security made AusCERT2020 — whose theme, coincidentally, was “We Can be Heroes” — happen. For the first time in its 19-year history, AusCERT featured two female keynotes, Kana Shinoda and Julie Inman-Gran, heroes in their own right.

spoke on the topic of “Online Safety during & after Covid-19”. The work she does within the eSafety portfolio helps keep Australians safe in today’s online world. Not only did the conference feature two female keynotes, two of the three winners of its annual Information Security Awards were female. Folks in the Australian cyber and information security community will be very familiar with Michelle Price, CEO of AustCyber. Michelle has been a tireless champion for the sector since her appointment in 2017. At AusCERT2020, Michelle’s contribution was

Kana Shinoda, known as the “mother of hackers”

recognised with her winning the Information Security

in her home country of Japan, told how she

Excellence award.

successfully established Code Blue, widely known as a pioneering hacker conference in Japan. Code Blue has established itself as a well-respected information

82

Julie Inman-Grant, Australia’s eSafety Commissioner,

WOMEN IN SECURITY MAGAZINE

The other deserving female award recipient was Rachael Leighton. Her work as Principal Advisor,


I N D U S T R Y

P E R S P E C T I V E S

Bek Cheb, the AusCERT Business Manager, was able to bring her business acumen and decadelong conference management experience to the table alongside Laura Jiew, AusCERT’s Events and Cyber Strategy & Awareness in the Victorian Government’s Department of Premier and Cabinet was recognised by her being named AusCERT Member Individual of the Year. Both women continue to make significant contributions to their workplaces despite the challenges brought by COVID-19, and they emphasised the importance of collaboration in the cyber and information security sector, saying the community needs to work together to make things happen. The AusCERT2020 program also featured several female speakers. Topics covered ranged from combating cybercrime and analysis, and reverse engineering of exploits, to the application of machine learning in cyber awareness training programs. Each presenter brought a unique perspective and shared this with the conference’s 1000+ delegates. Last but not least, the AusCERT2020 conference team was led by two women who rose to the occasion and put in months of hard work corralling more than 30 sponsor exhibitors, close to 80 remote presenters, and a myriad of delivery partners.

Marketing Communications coordinator, who drew on her communications and project management skills to ensure the conference was able to go ahead as planned. In the end, the conference was delivered as more than 80 hours of viewing material across four days and five streams from two production studios. In a year filled with challenges and uncertainties delegates were impressed with the conference experience, and very happy. Women have been especially affected by the COVID-19 pandemic through employment cutbacks in service-related sectors, their caregiving role and the constant demand from society to “juggle-it-all”. However AusCERT2020 amply demonstrated that, in cybersecurity, women are a force to be reckoned with. In the words of the famous sociologist and historian W.E.B Du Bois - “There is no force equal to a woman determined to rise.” www.linkedin.com/company/auscert/ twitter.com/AusCERT

WOMEN IN SECURITY MAGAZINE

83


20th Annual AusCERT Cyber Security Conference

11th - 14th May 2021 // The Star Hotel, Gold Coast, Australia

4

DAYS

50+ SPEAKERS

IN PERSON & VIRTUAL

Keynote Speakers

Ciaran Martin

Maddie Stone

UNIVERSITY OF OXFORD

GOOGLE PROJECT ZERO

REGISTER NOW

84

WOMEN IN SECURITY MAGAZINE

conference.auscert.org.au


TECHNOLOGY PERSPECTIVES


DEIKA ELMI

2021 AND BEYOND THE FUTURE OF CYBERSECURITY IS PROMISING by Deika Elmi, Security Risk Manager

2020 is finished but distributed, cloud-based

1. DISTRIBUTED OPERATIONS

operations are here to stay. As every financial investor

Whether you hate working next to your cat or love it,

and lottery winner can tell you, past performance is no guarantee of future results. That said, looking back on 2020, there are some things we can reasonably expect in 2021.

at present. That’s a good thing; the “nuclear model” of an SOC comprising a few specialists in a room was already on its way out. There are advantages with

Change is inevitable, but the pandemic has

distributed operations, and they are the way of the

accelerated changes already in progress in 2020,

future.

in particular increased use of remote working and

A distributed team can cover operational gaps. Most

cloud services. Their growth has created fragmented environments where there are many owners, and has brought new security challenges. Gone are the days of security operation centres (SOCs) cramming teams into cosy, windowless rooms. SOCs are now dispersed but not dispensable. In fact, their work is now extremely critical. For example, preventing just

people dislike having to work the “graveyard shift,“ and with a team spread across time zones night shifts are unnecessary: the sun never sets on a distributed operations empire. Also, remote workers can provide skills that might be hard to find locally. Skills aside, with cloud services security teams no

one breach can, typically, save $682,000.

longer have unilateral control over the tech stack that

So, how should SOCs go about adapting to this brave

AWS Inspector can do forensics better than almost

new world? John Velisaris of IBM argued in a recent keynote speech- that future SOCs will show four key characteristics:

86

you probably have no choice but to work from home

WOMEN IN SECURITY MAGAZINE

runs their SOC. The good news is that cloud tools like any in-house tool. When possible, you should use open standards like DXL and STIX/TAXII to make sure your tools can talk to each other.


T E C H N O L O G Y

P E R S P E C T I V E S

2. AI POWERED ANALYSIS

monitor the plane and intervene when necessary.

“Alarm fatigue” is a widely discussed problem in

Security is becoming automated in a similar way.

many industries. Too many alerts overwhelm people.

The latest security tools are born with the kind of

Ignoring alerts becomes a habit, then a disaster.

automation that can easily enforce policies without

When Facebook starts to notify you each time your

human involvement, such as automatically deleting a

great aunt posts a picture of her cat, you may start to

hazardous file in a container. Fully automated SOCs

disregard Facebook notifications and miss something

won’t come in 2021, but they’re on the horizon.

important: like being tagged in a super flattering photo. The same problem happens in security. You

Best Practices for Adopting the Four Characteristics:

can tune your settings, but you can’t totally eliminate

To avoid the costs of moving and reformatting a lot

noise.

of data:

AI-powered analysis can greatly mitigate this problem.

If you’re generating data in the cloud, leave it in the

Some tools can automatically enforce policies without

cloud! Don’t pay to move it into your data centre.

involving humans. In other cases, machine learning can compare incoming alerts to past alerts, and decide which to escalate for human attention. The kind of comparative analysis required to set up these rules manually would not be feasible for most teams. Even the best AI technologies cannot yet replace humans, but their algorithms can compare ~60 parameters across two years of alerts.

3. NEXT GENERATION EXPERTISE The missions of SOCs continue to be redefined and their roles expanded to meet changing demands: the next-generation of security experts must get closer to their businesses and closer to the cloud. To get closer to business operations security experts must learn the language of business, and pick up domain knowledge of the business they serve. Today, not matter what business they support, everyone in security needs to know cloud platforms. Security in the cloud is far from standardised, but there are some serious developments underway. “AWS re:Invent” is a virtual conference happening now that will launch many new cloud-native security controls, and Microsoft already has over 1,000 cloudnative security controls for Azure. You should use open standards wherever you can, such as the DXL data exchange format. Open standards tend to become general standards.

4. AUTOMATED PROCESSES Airplanes are heavily automated, capable of flying themselves between take-off and landing. Modern

Use tools that have federated data search capabilities, so that you can search multiple data sources simultaneously. Use tools that are grounded in open standards and can interact with each other, so you don’t have to move data between formats.

When pioneering new processes: Buy tools that allow you to use your own in-house AI or machine learning. By acquiring other people’s AI or ML you often end up with tools that don’t fit your exact needs. Try piloting just-in-time expertise with one function, one process. Don’t try to implement it everywhere at once. So, in summary, there are many lessons from 2020 to put into practice in 2021. If you’re a human reading this, make sure to take full advantage of automation and skip repetitive tasks. Where you are automating, consider machine learning to monitor the automation and filter out excessive notifications. Cloud platforms aren’t standardised yet, so use open standards where you can and consider bringing in just-in-time expertise. And if you’re a robot reading this, remember I said such flattering things about you when you carry out the singularity.

www.linkedin/in/deikaelmi

twitter.com/DeikaE

pilots don’t constantly adjust the controls, they WOMEN IN SECURITY MAGAZINE

87


MARISE ALPHONSO

SECURITY THROUGH A HYGIENE LENS by Marise Alphonso, Information Security Lead at Infoxchange The advice from local and international authorities

measures that can be applied to people, processes

for protecting ourselves and others from coronavirus

and technology.

(COVID-19) is all about washing or sanitising our hands, physical distancing, wearing masks, selfisolation, quarantine, signing in at locations we visit, and cleaning our workplaces and other common areas. The requirements to maintain security of data and IT systems in organisations are in some ways similar to these hygiene practices. The asset in each case: “data and human life”. We can draw parallels with how we have been guided to do our part to stop the spread of the coronavirus. Defence-in-depth equates to mask wearing, hand washing and the other practices listed above. Least privilege equates to leaving your home only for specific reasons when restrictions are in place, or isolating if you have symptoms. Security is not a state, but a process (Cyber Leadership, Mansur Hasib, p2) with risk management at its core. Organisations must assess their level of risk regularly in light of changes in internal and external factors that influence their security posture. Risk scenarios promote discussion around events that could compromise the security of an organisation. Standards and frameworks, such as ISO/IEC 27001 and NIST CSF, detail multiple security

88

WOMEN IN SECURITY MAGAZINE

Similarly, risk assessments have been performed in workplaces across Australia based on COVID-19 government advice, and COVID-Safe workplans have been developed and implemented to keep employees and customers safe. For example, one measure to create a COVID-safe workplace is the requirement for visitors to a location to register their contact details so health authorities can conduct contact tracing, protect others and limit the spread of the virus. In the information security realm we maintain an inventory of our assets, in particular organisational data, to understand where it is and how it is protected, and create a baseline for security practices. A critical initial step to maintaining the confidentiality, integrity and availability of IT systems and information is to identify the key assets that require protection. To this end COBIT (Control Objectives for Information and Related Technologies), a framework for the governance and management of enterprise information and technology, may prove useful. COBIT is an IT management framework developed by ISACA to help businesses develop, organise and implement


T E C H N O L O G Y

strategies around information management and

P E R S P E C T I V E S

governance. COBIT references components of a governance

and depended on by key assets. •

system and can be used to understand how asset management, as a process, works in an organisation. Its application to specific practices within an organisation will, over time, increase the efficiency and effectiveness of those practices.

Information: details recorded about assets that facilitate their lifecycle management.

Services, Infrastructure and Applications: asset management systems or repositories.

People, Skills and Competencies: staff awareness and training on asset management

An overview of the contribution of COBIT’s components to asset management is outlined here:

Processes: business processes dependent upon

practices. •

Culture, Ethics and Behaviour: information security is a part of the operational practices of

“It should come as no surprise that the hygiene practices we apply in the physical world have parallels in the digital world”

the organisation. By applying the COBIT framework an organisation should be able to: identify and understand the assets to which information security hygiene practices are applicable; perform risk assessments linked to those assets; apply protection measures using defence-indepth, least privilege and separation of duties. As we move more of our lives and organisational

Principles, policies and procedures: documented information outlining practices and activities for managing technology assets and information.

Organisational structures: roles and

activities into the digital world, the physical and virtual worlds begin to merge. So it should come as no surprise that the hygiene practices we apply in the physical world have parallels in the digital world. www.linkedin.com/in/marise-alphonso/

responsibilities allocated to ownership and administration of assets.

WOMEN IN SECURITY MAGAZINE

89


CHRISTIE WILSON

RUNNING A DIGITAL CYBER SECURITY TREASURE HUNT by Christie Wilson, Dog Lover & Cyber Enthusiast

Never underestimate the appeal of a cute cartoon owl.

Cyber safety is a tough sell. In security awareness

‘Nudges’ are also useful in security awareness, to

circles you’ll often hear people talk about teaching

promote good security habits. Little reminders,

‘security as a life skill’, the idea being that people will

incentives, give-aways, and prizes can encourage

adopt good security habits in the same way they

people to lean in and listen to your message.

‘naturally’ adopt healthy habits. But really, who adopts healthy habits naturally and easily?

As with many companies, our employees pivoted to working from home last March, almost overnight.

We all know we should eat well, exercise regularly,

Our security awareness and training program runs

visit the dentist twice a year, have an annual health

throughout the year and comprises ‘mandatory’

check-up. Who has time for that? Life gets busy, and

compliance training, phishing fire drills, and nudge

it’s easy for healthy habits to fall by the wayside.

tactics to raise awareness. It was a challenge finding

That’s why our health funds give us little incentives

new ways to get engagement and buy-in from our

like Fitbits, gym membership discounts, and healthy

people as they adjusted to new ways of working,

extras. They’re little ‘nudges’ to encourage us to do

juggling everything that entailed.

the right thing to keep ourselves healthy.

With our people working from home, it was even more important to develop fun and engaging means

90

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

of reminding them where to find cyber security

else had shared. The daily search for Al reinforced his

information. So I created a digital treasure hunt to do

role as a visual representation of security. Whenever

just that.

our people see Al, they know he’s sharing a cyber

A treasure hunt motivates players to find clues and objects, reach locations, solve puzzles and win prizes, all while learning something. I used the treasure

safety message. The more raffle tickets people won, the more chances they had in the prize draw, similar to playing the

hunt to promote Scams Awareness Week.

lotto. At the end of the week I used a

I created incentives for our people to

competition randomiser — a random

explore information on our intranet

number generator you can find on the

site and social media channel,

web — to draw the winning ticket for

Yammer, while contributing to the

the treasure hunt prize.

ongoing cyber safety conversation.

Most people found it pretty difficult to find Al on the Yammer site, and I

The Scams Awareness Week

was concerned I might demotivate

theme was: ‘Be yourself. Don’t let

them for the rest of the week. So, I

a scammer be you’. Its aim was to

was pleasantly surprised when someone

educate and empower people to protect

emailed me one morning to say, “yesterday’s

their personal and financial information in an increasingly digital environment. And I had a secret

clue was really hard, which motivated me to try harder

weapon to help me. Al the Owl is our cybersecurity

today”.

mascot. I use him to promote cyber safety messages across the organisation. He appears in presentations, email signatures, and even his own ‘security tips’ videos. For the treasure hunt, Al became our ‘treasure’. I posted a new treasure hunt clue on Yammer each morning. I aligned the clues to the daily scam topic. Each day players hunted for Al the Owl hidden somewhere on our information security intranet pages or on our security news Yammer site. Some days players might have to read a web page, on others watch a short video, or try to find a Yammer post about COVID-19. I tried to not make the clues too tricky, because I wanted people to be engaged, and keen to keep playing as the week progressed. Also, the prize up for grabs needed to be sufficiently appealing to encourage people to keep playing throughout the week. So I created a prize draw for an iPad mini. To enter the draw, players needed to secure

Sharing learnings on Yammer encouraged people to have a conversation about cyber safety. Often, people respond better to messages from their peers, and that‘s also the case for cyber safety messages. It was brilliant watching the chat each day and seeing what information people found valuable and wanted to share. It was also a terrific way to gauge the effectiveness of our current training materials, and I’m using that information to develop new content. Overall, the treasure hunt was successful. It increased the Yammer group membership, and we had lots of unique visits to the intranet site. Best of all, we got two new cyber evangelists for our security champions program. My learnings from this exercise? People do want to stay safe online, and a prize may be the nudge they need to learn more. Oh, and never underestimate the appeal of a cute cartoon owl.

raffle tickets. Each day of the treasure hunt, to get a raffle ticket, players had to find Al on the site the clue

www.linkedin.com/in/christie-wilson-9135317/

had led them to. They also had to post on Yammer one new thing they’d learned from the site that no-one

WOMEN IN SECURITY MAGAZINE

91


CHIOMA CHIGOZIE-OKWUM

MITIGATING AGAINST SOCIAL ENGINEERING by Chioma Chigozie-Okwum, Spiritan University Nneochi, Abia State, Nigeria.

Cyberspace now plays a huge role in our lives. It’s

the emotions and humanity of their victims to build

a place of work, learning, recreation, leisure, and a

trust and, ultimately, to defraud them.

means of building new connections and friendships. It provides company for many lonely hearts, giving them boundless space and a seamless interface for interaction. Little wonder many people spend endless hours online connecting, interacting and maintaining relationships.

lovers, fans and even associates. They gain the trust and confidence of their victims and induce them to divulge sensitive, confidential information which they then exploit to defraud those victims. Such information could be login details for financial

However, much as cyberspace offers a solution

accounts, or other personal confidential information.

to boredom and loneliness, it also creates a safe

Losses can be enormous.

haven from which those lacking scruples can exploit unsuspecting individuals. It gives them an easy avenue through which to reach large numbers of victims whose lives they can damage, anonymously and by stealth. Social engineering is as old as humanity, but has become more prevalent as the internet has provided easier and faster communication channels for individuals. Social engineers are criminals who exploit

92

These criminals present themselves as friends,

WOMEN IN SECURITY MAGAZINE

Social engineers are usually very patient and highly manipulative. They have been profiled as the most patient of all cyber criminals. They trail their victims and study them to identify each victim’s particular vulnerability points that can be exploited for an attack. They launch their attacks by traversing a victim’s personal space, moving around the victim’s timelines, liking, commenting and promoting the victim’s posts


T E C H N O L O G Y

to gain confidence and trust until the victim sees the scammer as a kindred spirit and trusted ally, at which point they unleash their attack.

P E R S P E C T I V E S

2. Carry out independent investigation before committing to online relationships. 3. Always make unscheduled calls and visits to

Popular strategies include stories of family members

online contacts. This will help poke holes in the

being terminally ill and in hospital, of job losses, of

scripts played out by social engineers.

becoming victims of natural disasters, etc. Every story is designed to invoke the victim’s sympathy and get the victim to start paying. The scammers repeat the same stories to multiple victims. So, be extremely careful online especially with how you share your personal details and information. Stay vigilant and be very suspicious of any request for money.

4. Before you part with your hard-earned money listen to your intuition and instincts. The cyberspace is home to the good, the bad and the ugly and hence you need to remain awake and vigilant at all times. Be cyber aware and stay safe online at all times. www.linkedin.com/in/chioma-chigozie-okwum-376793122

1. Beware of people who offer love, support and friendship online. Be vigilant; all that glitters

www.facebook.com/chioma.chinakachigookwum

online is not gold.

WOMEN IN SECURITY MAGAZINE

93


NISREEN AL KHATIB

SOCIAL MEDIA SECURITY by Nisreen Al Khatib, CISA, CISM, CRISC, CSXF, Cybersecurity Consultant and Educator

Tina is a very active person on social media where

She called her trusted friend Lina who works in

she always shares her updates and activities. She

Information Security trying to find answers and

is 20 years old studying business administration at

understand what could have happened. Lina directly

the university. She loves taking selfies and photos

advised her to report the issue to Facebook.

and shares her fun moments on her social media platforms. The popularity of her photos is reflected in a large number of likes and comments. One day her friend Karim called her. He expressed surprise and astonishment about an inappropriate message he had received from her on Facebook Messenger. Tina was surprised! She has not sent any message! She rushed and opened Facebook Messenger and saw the message. Her eyes opened wide in shock and surprise. She was totally embarrassed, seeing one of her photos manipulated inappropriately and sent to Karim along with content she had not created. How could this happen? She had not sent any message! Tina was shocked, confused, angry and embarrassed, but clueless as to what has happened.

Also, Lina advised Tina to take a few steps to protect the security of her social media account. Tina was surprised to know that by taking simple steps she could drastically improve the security and privacy surrounding her profile and the content, and minimise the possibility of such events occurring in future. Some of the measures she applied to her Facebook account based on Lina’s advice were:

1. USE A STRONG PASSWORD: Tina changed her password immediately to a more complex password, which she had not used on any other platform. (On desktop or in the mobile app, tap the drop-down menu on the top-right side of Facebook and select “Settings & Privacy -> Settings-> Security and Login-> Change password)

94

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

2. USE TWO FACTOR AUTHENTICATION

Meanwhile, Lina continued her investigations

Tina activated two factor authentication so she

to discover that Tina used several third party

needed authentication in addition to her password to

applications on Facebook. This happens when a user

access her account.

opens an application and selects the option to “log

(Tap the drop-down menu on the top-right side and

Because she had done this, it was highly likely that the

select Settings & Privacy -> Settings-> Security and Login-> Use Two-Factor Authentication)

3. SIGN-OUT FROM UNKNOWN DEVICES Tina checked devices used to access her Facebook account and signed out from all unknown devices.

in with Facebook” instead of creating a new account. people or companies behind those apps knew a lot about Tina. According to Facebook: “each app that you log into will get your gender, networks you belong to, username, your user ID, your full name and your profile picture. They also get access to your full

(Tap the drop-down menu on the top-right side and

friends list and any other public information on your

select Settings & Privacy -> Settings-> Security and

profile.” Moreover, some apps which are malicious

Login -> Authorized Logins)

can steal username and passwords. This is what

4. ADDITIONAL MEASURES: Tina set an additional security feature “Get Alerts about unrecognized logins” which notifies her of logins from new unrecognised devices. Tina unfriended all the people she doesn’t know. Tina set privacy controls to specify who could see

happened to Tina. Tina was able to recover her account. She explained to Karim what had happened and promised her friend Lina that she would apply these simple protection measures to all her social media platforms as well as any accounts that store sensitive and confidential information about her.

your posts, activities, friends, etc. https://www.linkedin.com/in/nisreenalkhatib/

WOMEN IN SECURITY MAGAZINE

95


CLAUDIA DA COSTA BONARD DE CARVALHO

CYBERSECURITY IN COMPANIES AND THE PROTECTION OF FUNDAMENTAL RIGHTS by Claudia da Costa Bonard de Carvalho, Brazilian criminal lawyer in Advocacia Bonard de Carvalho and Panelist

We live in an extremely connected world where

There are already numerous information security

virtually any activity depends on the use of

tools that can protect data and systems from

technology: the so-called information society.

cyber threats. However, efficient and responsible

This has become more evident as a result of social distancing and lockdowns imposed in many countries to contain the spread of COVID-19. Thousands of

security protocols; it requires conscious cyber governance of all aspects of business operations.

people have been forced to work and study at home,

Data protection strategies and systems must protect

buy products and request many online services.

not only companies and their systems, but the rights,

This sudden growth in consumer demand has driven growth in ecommerce and a requirement for stronger network and system protection to keep consumers safe from electronic intrusions and scams. Not all companies have been able to adapt, putting at risk the security of their systems and their reputations.

96

cybersecurity requires more than software and

WOMEN IN SECURITY MAGAZINE

privacy and freedoms of their customers. The need for customer protection, and a history of failures by organisations to maintain it, has resulted in various legislative, administrative and judicial measures for customer protection.


T E C H N O L O G Y

P E R S P E C T I V E S

The right to privacy and the unauthorised sharing of

receiving treatments as a result of loss of insurance

personal data by companies has led to several laws

cover.

such as GDPR (Europe), LGPD (Brazil) and CCPA (California-USA). Some companies freely sold their customers’ details to third parties who then spammed customers with advertising messages, some of which contained malware, without any authorisation from the recipients of those messages.

Aside from cybercriminals, governments exploit cyber technologies to infringe human rights. Security monitoring systems developed for safety surveillance, such as tracking people and vehicles on public roads, are being used in some countries to monitor the

Such laws aim to regulate the processing of personal data and prohibit its misuse by unauthorised persons and cybercriminals. Ecommerce services that lack adequate cybersecurity measures can expose customer data to cybercriminals, who can make

“Efficient and responsible cybersecurity requires more than software and security protocols; it requires conscious cyber governance of all aspects of business operations.”

unauthorised purchases on behalf of customers and gain access to their bank accounts, creating huge financial losses. In such cases an injured customer could sue the company for failing to protect their personal data and be compensated for the damage caused. The COVID-19 pandemic has also exposed weaknesses in health information systems that have compromised medical records, and revealed vulnerabilities in medical equipment that have put lives at risk. These flaws have been exploited to obtain data from patients’ health insurance records, to commit fraud against insurers, and potentially prevent patients

activity of people. Data gleaned from mobile phone networks is also being used to the same end. Such monitoring of citizens has generated protests in many countries, and generated debates in their legislative chambers on the legality and necessity of these measures. Thus there is a range of non-technological issues to be considered around companies’ cybersecurity activities to ensure companies behave ethically and fundamental human rights are not violated.

www.linkedin.com/in/claudia-bonard-de-carvalho-5187b645/

WOMEN IN SECURITY MAGAZINE

97


Aspiring Women in Security CISO Masterclass The Australian Women in Security Network (AWSN) in partnership with The Security Collective are excited to offer an exclusive short masterclass aimed at women who are aspiring to be Chief Information Security Officers. The CISO masterclass will provide both group and 1:1 coaching sessions for participants to understand potential career paths to CISO roles and to set goals for their own career progression. Starting 23rd March, 2021

Visit awsn.org.au for information about exclusive events, programs, and content. Join Australia's largest community of women in cyber and physical security.


SONYA SHERMAN

INFOSEC AND RM WORKING TOGETHER FOR SAFER SHARING by Sonya Sherman, Founder and Principal at Zen Information

Cybersecurity is a priority for all organisations, and

analysis from the UK shows an element of human

an especially hot topic in government. Throughout

error in up to 90 percent of notifiable breaches and

2020, pandemic response drove rapid digital

it’s the only cause that has continued to increase in

transformation. Barriers and objections were

frequency2.

swept aside to swiftly enable remote working and coordinated action. In one survey, 85 percent of CISOs admitted they had sacrificed cybersecurity during this transition.

The pandemic has also seen a surge of concerns around accidental or improper sharing of data, with 92 percent of organisations considering it a critical threat3. This is hardly surprising when the leading

Both national security and crisis management require

factors influencing mistakes are stress, fatigue

highly sensitive information to be securely shared

and distractions4. It’s difficult to create a physical

between applications, individuals, organisations

environment that supports concentration and focus

and jurisdictions. It’s also well recognised that data,

when people are operating from home alongside

information and digital infrastructure are the keys to

partners, kids, housemates and pets.

economic recovery. This means a growing volume of sensitive information is being exchanged through systems and processes that may have been hastily implemented – and are of ongoing importance.

THE ‘HUMAN ELEMENT’ IMPACTS CYBERSECURITY COSTS AND RISKS But security is not just about technology; it’s about people. Human error remains the second largest source of data breaches reported to the Office of the Australian Information Commissioner (OAIC)1. Similar

Identifying and addressing staff capability gaps is a high priority. How can we better support people to safely use and exchange sensitive information, and reduce the likelihood of human errors? The answer can be found at the intersection between information security and records management, through enhancements to existing standards and capabilities – and by sharing knowledge between skilled professionals. Information governance provides a unified strategic framework to protect and optimise corporate

WOMEN IN SECURITY MAGAZINE

99


information assets5. Each element of information

they can be handled consistently by both the

governance is focused on specific risks and benefits.

sending and receiving systems, regardless of the

Organisations can gain the most when different

software.

elements work together. Interoperability requires the systems and services that create, exchange or consume data to have clear, shared expectations for the content, context and meaning of that data6.

AN EXAMPLE: SHARING SENSITIVE OR CLASSIFIED DOCUMENTS One example is an agency in federal government and an agency in a state government sharing documents which contain sensitive or classified information. A document (eg Microsoft, Google, Adobe, image or media file) is stored in a secure corporate repository. The sender shares a copy of the document as an attachment to an email. The receiver captures the email and attached document into their own corporate repository. The document moves through at least four different applications; between jurisdictions with aligned, but not identical, regulatory requirements; and between organisations with different information management frameworks and technology infrastructures.

policies in a machine-readable form. This metadata can then be used to drive automation, reducing manual handling and human decision-making, and decrease the risk of mistakes. The Email Protective Marking Standard (EPMS), now in its third iteration, is an Australian innovation to identify the sensitivity of content shared by email. It was through conversations with some of the coauthors of the original EPMS that the concept for this paper was formed7. As a technical specification recognised by diverse vendors, EPMS enables nonproprietary information exchange. A similar open standard for documents seems long overdue. EPMS is one of a suite of Australian Government standards that enable secure, automated email exchange. The metadata is standardised in the Australian Government Recordkeeping Metadata Standard (AGRkMS), which assists agencies to maintain reliable, meaningful and accessible records. The minimum metadata set identifies essential

This involves manual handling and human decision-

properties for management and use of business

making. It requires staff to have knowledge of policies

information and transfer between agencies.

and the skills to apply them. It also relies on both agencies interpreting policies in the same way, to ensure sensitive information is handled consistently. This is fairly inefficient and leaves a lot of points where mistakes can occur.

Another Australian Government standard, the Protective Security Policy Framework (PSPF) assists agencies to protect their people, information and physical assets. The goal of PSPF is to maintain the confidentiality, integrity and availability of official

However, some parts of the process are streamlined

information. It establishes the rules for grading,

by automation and interoperability. Specifically the

labelling and handling sensitive and security classified

Email Protective Marking Standard (EPMS) provides a

information.

standard format for protective markings to be applied to the internet message header extension and/or subject line of an email. This helps with construction and parsing by email gateways and servers, and allows for information handling based on the protective marking. • Emails are consistently marked: prominent labels visually flag sensitive content and prompt staff to handle appropriately; • Message files include standard metadata: protective markings are machine readable so

100

The metadata provides the means to codify rules or

WOMEN IN SECURITY MAGAZINE

Also, the Australian Government Recordkeeping Metadata Standard (AGRkMS) assists agencies to maintain reliable, meaningful and accessible records. The minimum metadata set identifies essential properties for management and use of business information and transfer between agencies. These policies reference each other. They are designed to work together, and to support other types of access restrictions, such as personal privacy and legal privilege. The PSPF and EPMS require Australian


T E C H N O L O G Y

P E R S P E C T I V E S

Government agencies to apply the AGRkMS metadata

the challenges of an evolving regulatory and

properties.

technological landscape.

However, AGRkMS does not specify the means

Geopolitics and COVID-19 have increased the need

of encoding metadata into the properties of a

to share sensitive information and changed the way

document. This is a missed opportunity for security,

we work, bringing renewed focus to cybersecurity.

digital working and records management. If standard

Human error remains a significant source of risk,

metadata were embedded (or bundled/encapsulated)

despite heavy investments in awareness training.

and could ‘travel with’ a document, any other system

Automation could help by reducing decision-making,

could use it to drive automation. For example, a

manual handling and rekeying of data.

system could confirm an attachment had the same or lower security classification as the carrier email; or downgrade security according to expiry rules.

POLICIES AND STANDARDS ACROSS JURISDICTIONS These policies and standards apply specifically to Australian Government agencies but their impact is much broader. State governments must handle documents received from the Federal Government according to the PSPF and EPMS. Many states have mapped their information security policies to the PSPF for consistent handling of classified material. The AGRkMS is the basis of the Australasian standard AS/NZS 5478:2015 Recordkeeping Metadata Property Reference Set (RMPRS), which is compatible with the international standard ISO 23081

Standard metadata allows information to be managed consistently as it moves from one system or environment to another. The EPMS is an example of how this works with email. The AGRkMS offers a good foundation for documents, but it needs to include an agreed mechanism for embedding metadata into document properties. This would support secure sharing, reduce administrative overheads and provide a range of other benefits through improved interoperability. You can find a more detailed analysis of this topic and contribute your thoughts to the conversation here. www.linkedin.com/pulse/integrated-informationgovernance-sonya-sherman/ www.sonyasherman.medium.com/

Metadata for Records series. twitter.com/RMrisk

CONCLUSIONS AND NEXT STEPS An integrated and multidisciplinary attitude

twitter.com/ZenInformation

to information governance helps us tackle

ENDNOTES Notifiable Data Breaches Report: January – June 2020. Office of the Australian Information Commissioner. 31 July 2020. https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-data-breaches-report-january-june-2020/ 1

90% of UK Data Breaches Due to Human Error in 2019. 6 February, 2020. https://www.infosecurity-magazine.com/ news/90-data-breaches-human-error 2

The role of human error in cybersecurity. 8 October, 2020. https://www.comparitech.com/blog/information-security/human-error-cybersecurity-stats/ 3

Human Error: Understand the mistakes that weaken cybersecurity. 23 July, 2020. https://www.helpnetsecurity. com/2020/07/23/human-error-cybersecurity/ 4

5 Information Governance: Optimising the lifeblood of organisations. Information Governance ANZ. 12 November, 2019. https://www.infogovanz.com/information-governance/information-governance-optimising-the-lifeblood-of-organisations/ 6 Data Interoperability Standards Consortium. https://datainteroperability.org/ 7 The author wishes to acknowledge the contributions of Greg Colla and Neville Jones from Janusnet in the formation of ideas for this article. Any mistakes are the author’s own.

WOMEN IN SECURITY MAGAZINE

101


MEENA WAHI

HELPING BUSINESSES SAFELY EMBRACE DIGITAL by Meena Wahi, Director Cyber Data-Risk Managers Digital Risk Insurance Brokers

102

The rise of cyber-risks is however bringing new

most of them do not have the internal resources to

challenges and opportunities to cyber-security

stay informed about the risks they are exposed to.

and cyber-insurance professionals. The global

To start with, they should be able to know where they

cyber insurance market is projected to be valued at

are at, run diagnosis and identify the gaps in their

more than US$28,600 million by 2026, according

security. Then, they need to have a plan tailored to

to Allied Market Research’s recent forecast report.

different scenarios. Digital technologies are definitely

Perhaps you are already feeling these changes and

saving costs and time when used correctly in all

noticed that your portfolio of clients has changed, or

areas of their business (accounting, management,

expanded. On the flip side, this means a whole new

communications…), the whole business is online, but

market to approach, and it comes with questioning

the threat is real and growing as we have witnessed a

the way we do it and reconsider our methods.

rise in cyber attacks. So, how do we approach clients?

Cyber-security is no longer reserved to tech savvy

They key here is reassurance, and this would come by

or digital only businesses, it has become a non-

offering them an end-to-end approach, that releases

negotiable to all companies, even if they might not

them from all worries. This opened an opportunity for

be aware of it. SMEs are the new target market, and

collaboration between cyber security and insurance

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

experts. Your role is crucial in raising awareness

We have seen a rise in cyber risks, such as data

about the risks, and guide clients through processes

breach, hacking or phishing. Not only have the

on how to be and feel safe. However, in these

number of cyber attacks risen, a big wave of digital

changing times, residual risk remains and this is when

newbies have joined the online business world. We

insurance can fill the gap.

have seen everyone jump onto Zoom, the online

Welcome to a new business era where uncertainty is the new norm and all is happening online. These past

teleconference technology. But how many of them have thought about their data protection?

few months have redistributed the cards and showed

Recent cyber attacks scandals in the news such as

us the importance of reactivity and adaptability.

the Lion case should not overshadow the fact that

These qualities surely apply to businesses of all sizes,

small to mid-size businesses are targeted daily by

but put small to mid-size companies particularly

those threats. Lacking time to prepare, most of them

at risk. Because they are more flexible than their

probably jumped on board without giving too much

biggest sisters, they are facing one major challenge:

consideration to their safety. Privacy, data or their

preparation. In a context that not even the best

own company, but also the ones of their clients, which

experts could have predicted, we have witnessed

would not only be an issue for the latter, but also for

adoption of new digital tools, technologies or

their own reputation. Without sounding dramatic, it

methods in an impressive rapid timeframe. Whilst this

is crucial to remind our clients that cyber risks are a

is admirable, the issue is that assuring security might

constantly evolving threat.

not have been part of the plan. Many businesses that the cyber-security industry had not been used to working with have embraced digital technologies and this trend is most likely to last. Unfortunately, because of misconception not all are investing in insurances. The reality is that this

www.linkedin.com/company/cyber-data-risk-managers/ www.dataprivacyinsurance.com.au/digital-riskinsurance/helping-businesses-safely-embrace-digital/ twitter.com/cyberdatarisk

should be on their top priorities list, and this is our role to make them realise that, and to guide and reassure them through this digital journey.

WOMEN IN SECURITY MAGAZINE

103


KAVIKA SINGHAL

THE PRIVACY PARADOX by Kavika Singhal, Western Sydney University You are being watched! It can be an alluring tagline

invasion of privacy a benefit or a detriment? This

for a spooky movie, or a cruel reality for many.

example perfectly defines the PRIVACY PARADOX.

Technology is an essential element in the lives of more than 3.4 billion people across the globe, almost 50 percent of the global population. Their every action uses technology, that generates huge amounts of data every day. This data can reveal more about you than your personal diary. Infact, more than that. The Power of Privacy documentary raises questions on the policies of eminent organisations and unveils the reality behind the “Terms and Conditions” in every service’s usage agreement. It’s essential to optimise your identity on the web, to create a positive digital footprint. I tried to trace my own digital footprint (note: application names and locations are false for privacy concerns).

advertisements offering discounts on your previous Amazon order. This is called “Data-driven Marketing”. In the Forbes Magazine conference, Data is the New Oil, experts argued that the exploitation of data by organisations is the price consumers pay for the services they use. In the new future organisations value consumers’ data highly. So, are consumers to be blamed? In my opinion, internet millennials value their personal information and take appropriate security measures to avoid leakage of private information via the web, but they are hampered by loopholes in the privacy policies of governments and ‘prestigious’

If we examine the last section of the table, on the

organisations, and fall victim to zero-day attacks and

one hand marketing of irrelevant healthcare products

data breaches.

could harm me, but on the other hand, suggesting a new workout could improve my healthcare routine. Is

104

Often while reading news, you may come across

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

TRACING MY DIGITAL FOOTPRINTS

Daily Activity

Data Generated

Waking up: alarm

My phone/ smartwatch will record the time I wake up. It can track my sleep cycles, regularity, hours of sleep.

Who has access to this data?

How this data may be misused?

Google and Fasttrack, internet service provider.

To advertise products, count me as a sample in research conducted for students that wake up late in the morning, display articles related to the importance of sleep for good mental health.

Google, Fastrack, YouTube, Spotify, Amazon Music.

To create target audience for healthcare products, gym memberships. To create a playlist or promote more inspirational songs/ podcasts. To endorse instant fitness products and methods.

Exercise

Fitness routine -duration of workout. Location of my gym, tennis court, equipment used, songs I prefer during workout.

Travel

Location of workplace/ study, mode of transport, courses studied/ job profile. Songs I listen to while travelling.

Google Maps, Australian Government, University, Spotify.

To promote more universities to me around the same area offering me similar courses at cheaper rates. By fraudulent companies to promote graduate roles/ internship opportunities.

Using social media while travelling

My reading preferences, pages followed, personal interests, details of my connections and conversations via text, call, celebrity crushes, etc.

Facebook, Instagram, Google, Pinterest, YouTube, LinkedIn, BuzzFeed.

Suggestions for mutual friends. Promotion of brands, dating applications, fake celebrity profiles luring me to scams.

University, Zoom, Microsoft, Google (Search engine).

To track my study patterns. To advertise tools/resources used by university students, and new opportunities on & off campus.

Watching/ attending lectures

Time of lectures, courses enrolled in.

Privacy cynicism is a

passwords, firewalls, avoiding swearing on social

defence mechanism

media, attention to details in emails, not linking

adopted by users against

free links, privacy drills in large organisations) and

the Privacy Paradox.

those beyond our control (government policies, data

Privacy abuses such

breaches, totalitarian societies, lack of transparency).

as snooping by the NSA, Facebook Data Breach 2018 , have blurred the line between spying and surveillance. (Privacy cynicism, 2016) It’s the shared responsibility of consumers and the government to ensure a safe surfing environment. The Forbes article on online privacy and security

Each touch, each click triggers a series of algorithms that work to either benefit or harm users of technology. Both governments and people are accountable for the consequences. What do you think? www.linkedin.com/in/kavika-s-b60969192/

lists the privacy measures we can take (encrypted WOMEN IN SECURITY MAGAZINE

105


THE BEST COMPANIES FOR WOMEN TO WORK IN SECURITY by David Braue

Women-friendly initiatives are powering diversity in Australia’s employment leaders

WHAT MAKES A SECURITY FIRM BETTER FOR WOMEN TO WORK IN?

policies such as 14 weeks’ parental leave; and the

The cybersecurity industry has been growing so

which women can return to their original role.

much, so quickly, that there are as many different

IAG also offers on-site childcare during school

roles within the sector as you would care to imagine.

holidays, and flexible work arrangements that allow

Strong competition for skilled staff means most

women to job-share, work from home, and otherwise

employers have become more willing to be flexible

adjust their work-life balance as they need to.

in their hiring – but what makes a good workplace, a good workplace for women?

106

opportunity to take a year-long career break, after

Flexible work arrangements aren’t the only thing that attracts women to cybersecurity companies, but they

If you ask the executives at insurance giant IAG –

are definitely on the list – which is why even smaller

whose gender-diversity policies were recognised with

cybersecurity startups have been pulling out the

an AWSN Women in Security 2020 Award as the best

stops when it comes to family-friendly policies they

company for women to work in security – the answer

hope will support women who want to apply their

likely has many elements.

expertise to interesting new challenges.

The company’s leaders have promoted diversity and

Secure Code Warrior, a fast-growing startup that

celebrated inclusiveness, with extensive mentorship

prides itself on having been founded on a structure

and leadership coaching of women; workplace

of diversity, equity and inclusion, has similarly

WOMEN IN SECURITY MAGAZINE


F E AT U R E

implemented a range of initiatives to recognise and

Companies need to drive inclusive workplace policies

embrace diversity.

from the top, she said, noting that SCW’s executive

Initiatives such as school-holiday programs so that students can spend time with their working parents, for example, are intended to help staff maintain better work-life balance – as is the company’s blanket policy of providing 4 weeks’ paid maternity/paternity leave to its more than 260 staff anywhere in the world. That policy, launched as the COVID-19 pandemic tipped the work-life balance, is the kind of change that attracted Rimonda Ohlsson, who leads SCW’s people and culture team, to the role. “I’ve had a gravitational pull to some of these smaller, more niche businesses where I felt I could make a difference,” she explains, “and be more involved with the connection with people – and helping them, and

team had been actively working to create “a new kind of people culture agenda – one that’s modern, and evolutionary, and that actually creates a place where people can be successful, feel supported, and feel like they want to come every day to be successful without being bound by rules or bureaucracy.” Clearly communicated corporate principles – SCW calls its five-element mission statement the ‘Warrior Code’ – have helped “foster an open, inclusive environment that drives success,” Ohlsson says, “and we’re all aligning our strategy to that.” With employee engagement scores sitting at 84 per cent – well ahead of the industry benchmark of 72 – Ohlsson is confident the approach is working.

being part of that, and opening that into rapid growth.”

WOMEN IN SECURITY MAGAZINE

107


Yet maintaining this cultural momentum, she says,

staff – particularly the problem solvers that every

remains an ongoing effort as the company grows

company values – will feel engaged and valued.

– with the help of ‘culture warriors’ that are actively engaged in evaluating new ideas and shaping policies to continue promoting the company’s core culture of diversity.

GIVE THEM INTERESTING WORK Making a workplace friendly to women is about more than just scheduling, however. Exposure to stimulating, relevant projects has been a major drawcard for Jennifer Stockwell, who emerged from a background in languages – she speaks “five or six” of them – to work in counterterrorism, the Australian Cyber Security Centre and, ultimately, in her current role as cyber policy and national security leader with Telstra. Working at a company as large and varied as Telstra

Employers should also, Stockwell advised, be careful that they strike a good balance of technical and nontechnical staff, who bring skill sets like hers to offer different perspectives on the problems the company faces. “There is definitely a massively important place for really, really deep technical skills, she says, “and we have some amazing deep technical specialists in our team. But you’ve got to have people who can pull that out and say what it actually means, and translate and communicate it.” Finding those people often means thinking outside the box – recruiting women as readily as men, and people from all kinds of backgrounds. “Make sure you’re getting that balance,” she says, “and that you’re not just recruiting in your own image and recruiting people with a certain type of background. Because that limits

“Diversity fosters innovation, and it’s good for business. Diverse workplaces are a lot more productive, and they hit their financial targets by up to 120 per cent – but we need to understand the real challenges faced by individuals, in order to take the right steps to address it”.

innovation and creativity– and you can have less innovative thinking.” Ultimately, cybersecurity companies wanting to make their workplaces more appealing to women simply need to make sure they provide a climate where opportunity is gender-blind, varied life commitments are accounted for, and that genuine interest is rewarded and encouraged in a consistent manner. The results, Australian Women in Security Network (AWSN) founder Jacqui Loustau noted during a recent Cyber Week panel, are both good for

has put Stockwell in the driving seat of major initiatives such as Telstra’s Cleaner Pipes project, a government-backed initiative for filtering malware and security attacks at the telco level.

“Diversity fosters innovation, and it’s good for business,” she said. Diverse workplaces “are a lot more productive, and they hit their financial targets by

Her team is also involved with “putting a geopolitical

up to 120 per cent – but we need to understand the

and nation al security lens on threat intelligence,”

real challenges faced by individuals, in order to take

she says. “It’s all about securing the network for the

the right steps to address it.”

greater good.” That sense of purpose is crucial for making a workplace somewhere where good cybersecurity

108

women and good for business.

WOMEN IN SECURITY MAGAZINE


AWARDS NOMINATIONS

O N 9T MAR www.surveymonkey.com/r/XHZ3GJV


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 01

02

1. AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist

2. RACHEL OKOJI

Virtual Intern, Mossé Cyber Security Institute

03

04

3.KATE MONCKTON General Manager Security and Privacy Assurance, Risk and Consulting at nbn

4. TONI JAMES Product Owner | Security Advisor | ChCon.nz Organiser | Diversity Advocate | Speaker SafeStack Limited

05

06

5. JOSS HOWARD Cyber Security Senior Advisor, NCC Group APAC

6. SKYE WU Acting Discovery Manager, Telstra Cyber Security Investigator, Speaker, Mentor & Champion for Diversity

07

08

7. MARY ATTARD Partner, Cyber Security & Digital Trust - Identity & Access Management at PwC Australia

8. NICOLE NEIL Senior Manager Information Security - APAC at Newell Brands.

09

10

9. SNEZANA JANKULOVSKI Chief People Officer, CyberCX

10. JODIE VLASSIS Cyber Security SME in Trust and Security at Atlassian Follow Atlassian on LinkedIn, Facebook, Instagram and more; www.atlassian.com Want to know more about the security of our products? Head over to the Atlassian Trust Center www.atlassian.com/trust

110

WOMEN IN SECURITY MAGAZINE


11

12

11. BRIANNE HADLEY Creative, connector, and knowledge vacuum

12. SARA MOORE Cyber Threat Intelligence Analyst

13. MIN KYRIANNIS 13

14

Diversity in Security & Technology Champion

14. ELISA MULA Inclusion Advocate in Security

15. ABIGAIL SWABEY

15

16

Co-founder Source2Create, Organiser of AWSN Women in Security Awards, and Publisher of Women in Security Magazine Source2create Source2create Women in Security Magazine

16. Marie-Eve Laplante Cybersecurity Strategic Advisor , Desjardins

17

18

17. ANOORADHA GOEL Security is everyone’s responsibility

18. GIULIA TRAVERSO PhD- Senior Consultant Cybersecurity, EY

19. SAI K HONIG 19

20

NSNWS BCA

20. MELANIE NINOVIC DFIR Consultant, ParaFlare.

WOMEN IN SECURITY MAGAZINE

111


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 21

22

21. MARIANE C LOUVET Channel leader - Cyber Security

22. HARPREET KAUR NAHAR Student at Edith Cowan University

23. RIMONDA OHLSSON 23

24

VP, People & Culture at Secure Code Warrior

24. NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

25. CRAIG FORD 25

26

Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2

26. KAREN STEPHENS 27.NANCY BENJUMEA Data security analyst and amateur writer

27

28 28.QUEEN A AIGBEFO Research student, Macquarie University

29. JACQUELINE JAYNE Security Awareness Advocate, KnowBe4

29

112

30

WOMEN IN SECURITY MAGAZINE

30. SONYA SHERMAN Sonya Sherman, Founder and Principal, Zen Information


31

32

31. DEIKA ELMI Security Risk Manager

32. MARISE ALPHONSO Information Security Lead at Infoxchange

33. NISREEN AL KHATIB 33

34

CISA, CISM, CRISC, CSXF, Cybersecurity Consultant and Educator

34. CHIOMA CHIGOZE-OKWUM Spiritan University Nneochi, Abia State, Nigeria.

35

36

35. CLAUDIA DA COSTA BONARD DE CARVALHO Brazilian criminal lawyer in Advocacia Bonard de Carvalho and Panelist

36. CHRISTIE WILSON Dog Lover & Cyber Enthusiast

37

38

37. KAVIKA SINGHAL Western Sydney University

38. MEENA WAHI Director Cyber Data-Risk Managers Digital Risk Insurance Brokers

39. LAURA JIEW 39

Events, Marketing and Communications coordinator for AusCERT, Australia’s pioneer Cyber Emergency Response Team

WOMEN IN SECURITY MAGAZINE

113


TURN IT UP

LOCAL AUSTRALIA PODCASTS

THE SECURITY COLLECTIVE By Claire Pales

CLICK TO LISTEN

CYBER IN BUSINESS

By Beverley Roche

By CTRL Group

CLICK TO LISTEN

CLICK TO LISTEN

The Security Collective, hosted by Claire Pales, is the podcast for all people who are interested in the foundations on which effective and robust cyber security is built on: people, process, data and technology.

Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life.

Cyber in Business, a platform where the best minds in cybersecurity share their insights with businesses. We operate on the belief that only a cyber secure business can outlast. This platform is all about information sharing and helping business leaders make more effective decisions.

OZCYBER UNLOCKED

GET WISE

By AustCyber

By WiseLaw

AFTERNOON CYBER TEA

CLICK TO LISTEN A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.

114

CYBER SECURITY CAFÉ

WOMEN IN SECURITY MAGAZINE

CLICK TO LISTEN Get Wise is a regular podcast organised by Principal - EJ Wise of the specialist cybelaw firm WiseLaw. Join us as we discuss emerging trends within the cybersecurity and legal landscapes, provide short snippets of advice on how you can boost your cyber resilience, and delve into the niche aspects of cyber law.

By PodcastOne

CLICK TO LISTEN Ann Johnson, Corporate Vice President, Business Development, Security, Compliance & Identity at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers.


KBKAST By KBI

CLICK TO LISTEN The Voice of Cyber - KBKast brings you interviews, discussions and presentations from global leaders across information security and emerging technology.

PRIVACY MATTERS WITH NICOLE STEPHENSEN By IoT Security Institute

CLICK TO LISTEN Privacy and the protection of personal data in the context of Internet of Things technologies. The Privacy Matters podcast, hosted by Nicole Stephensen is an initiative of the Internet of Things Security Institute (IoTSI).

‘THE OTHER SIDE OF CYBER’

THE AZURE SECURITY PODCAST

By Jacqueline Jayne and co-host James Azar

By Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

CLICK TO LISTEN From both sides of the world, it’s The Other Side of Cyber. Join your hosts James Azar and Jacqueline Jayne (JJ) as they go beyond the crime and explore the aftermath of the human element and the price we pay.

CLICK TO LISTEN A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/

THE NATIONAL SECURITY PODCAST By Policy Forum - ANU National Security College

CLICK TO LISTEN Chris Farnham and Katherine Mansted bring you expert analysis, insights and opinion on Australia and the region’s national security challenges in this pod from Policy Forum and the ANU National Security College.

ISACA PODCAST By ISACA

CLICK TO LISTEN The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities. WOMEN IN SECURITY MAGAZINE

115


TURN IT UP

GLOBAL PODCASTS

WOMEN IN SECURITY PODCAST By Lifen Tan

CLICK TO LISTEN This podcast is devoted to the world of information & cyber security and the great women who make it turn. In each episode, I sit down with a guest speaker to discuss their experiences and touch on some of the lesser known aspects of the industry.

By Monica Verma

CLICK TO LISTEN A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business.

HUMAN FACTOR SECURITY By Jenny Radcliffe

CLICK TO LISTEN Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.Podcast.

WE HACK PURPLE

THE CYBER JUNGLE

SMASHING SECURITY

By Tanya Janca

By Ira Victor and Samantha Stone

By Graham Cluley, Carole Theriault

CLICK TO LISTEN The We Hack Purple Podcast will help you find your career in Information Security via interviews with our host, Tanya Janca, and our guests from all different backgrounds and experiences. From CISOs and security architects, to incident responders and CEOs of security companies, we have it all. Learn how they got to where they are today! www.WeHackPurple.com

116

WE TALK CYBER

WOMEN IN SECURITY MAGAZINE

CLICK TO LISTEN The CyberJungle is the nation’s first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fastpaced and includes hard hitting news analysis. Formerly The Data Security Podcast.

CLICK TO LISTEN A helpful and hilarious take on the week’s tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It’s not your typical cybersecurity podcast...


on the couch WITH VANNESSA MCCAMLEY WWW.WOMENINSECURITYMAGAZINE.COM


OFF THE SHELF

UNMASKING THE HACKER: DEMYSTIFYING CYBERCRIME Author // Amanda-Jane Turner Do you use computers, smart phones and the internet? If you do, please read this book and help protect yourself from cybercrime.There is no solely technical solution to fight cybercrime and neither is there a solely human solution. That is why everyone who uses technology and the internet need to have at least a basic understanding of what they can do to help protect themselves in cyberspace. The stereotype that cybercrime is committed by mysterious hoodywearing hackers is harmful. It encourages a feeling of hopelessness about how to protect ourselves and our information. How can we fight these mysterious hidden figures? This book provides easy to understand information to demystify cybercrime and make cyber security more understandable and accessible to all. As technology has evolved exponentially since the advent of the Internet, and because each subsequent generation does not know a time without being connected via smart phones, social media and emails, this book also provides a brief history of computing and the Internet, hacking, social engineering and cybercrime.

BUY THE BOOK HERE

118

WOMEN IN SECURITY MAGAZINE

CYBERSECURITY FOR EVERYONE Author // Amanda-Jane Turner Cybercrime is big business. As the use of technology increases, so does the opportunity for crime. There is no solely technical solution to stopping cybercrime, which is why it is important for all users of technology, regardless of age, race, education or job, to understand how to keep themselves safer online. To help all users of technology gain a better understanding of some cybersecurity basics, this book presents easy to understand information, with the added, and possibly dubious, bonus of entertainment in the form of limericks and cartoons. Stay informed and stay safe.

BUY THE BOOK HERE

MOTHERS OF INVENTION Women in Tech Author // Amanda-Jane Turner This colouring-in book, a companion to the non-fiction book Mothers of Invention - Women in Tech is aimed at young people and the young at heart.

BUY THE BOOK HERE

WOMEN IN THE SECURITY PROFESSION Author // Jacqui Loustau, Helaine Leggart, Yvonne Sears A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management. It provides a historical perspective on how women have evolved in the industry, as well as providing realworld tips and insights on how they can help shape its future. The comprehensive text helps women navigate their security careers, providing information on the educational requirements necessary to secure the wide-ranging positions in today’s security field. Women in the Security Profession describes available development opportunities, offering guidance from experienced women professionals who have risen through the ranks of different security sectors.

BUY THE BOOK HERE


THE SECURECIO

A HACKER I AM

A HACKER I AM VOL.2

How to Hire and Retain Great Cyber Security Talent to Protect your Organisation

Author // Craig Ford

Author // Craig Ford

A Hacker, I Am is not your normal cyber security book, it explains topics in stories, scenarios, without all the Jargon. Its fun, educational and you can read any chapter you want in any order you want. You bought the book you should be able to read it how you want.

The book as you would have probably guessed it by now is all about Cyber Security but it’s not written to be overly technical, it’s written so that it can be understood by anyone who wants to learn more about how to better protect themselves. This book will be great at helping introduce individuals to the cybersecurity and help them get a better understanding of what to look out for, what problems we are all going to face in the future but also have a bit of fun while we are at it. Or if you are already in the industry then it will be still an entertaining read that can help give you a different perspective on a few things.

Author // Claire Pales This book provides a step-by-step framework to address the challenges of finding and retaining cyber security leaders. Guiding CIOs and their peers through the establishment of a Security Agenda, this straightforward framework doesn’t end at contract signing. From establishing nonnegotiable traits to ensuring the new leader effectively transitions into the role, The Secure CIO removes the burden of hiring a cyber security leader.

BUY THE BOOK HERE

This book has been created to help everyone, not just the technical folk understand cybersecurity and the associated risks. Some new technologies and what we need to do to be prepared for them. My opinions on several cyber-related topics that will help you all be better informed on what you need to know and some advice on how you can improve your systems. I poke a bit of fun at my own industry at times and just try to make the topic a bit more enjoyable.

BUY THE BOOK HERE

BUY THE BOOK HERE

LIFE IN CYBERSPACE Big Ideas : Book 5 Author // Cindy L. Otis Internet is a real place. Every time we switch on our computers, use a program or an application, or log in to a social media site, we enter a virtual space made up of worlds, domains, forums and rooms. But we behave differently when we interact with technology: technology amplifies and accelerates our deeds; it can help us find useful information, benefit from a wide range of services and stay in

touch with our friends, but it can also create addictive-type behaviours and subliminally manipulate us online. Mary Aiken, a cyberpsychologist specialised in the impact of technology on human behaviour, warns us about cybersecurity: “We need a human-centred approach that is mindful of how humans actually use connected things and not how the tech sector presumes or expects them to”. This is the fifth essay in the Big Ideas series created by the European Investment Bank.

BUY THE BOOK HERE WOMEN IN SECURITY MAGAZINE

119


OFF THE SHELF

PENETRATION TESTING A Hands-On Introduction to Hacking Author // Georgia Weidman Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment— including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

BUY THE BOOK HERE

INSECURITY

TRIBE OF HACKERS

Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe

Cybersecurity Advice from the Best Hackers in the World

Author // Jane Frankland IF YOU’RE SHORT ON WOMEN YOU’RE LESS SAFE. Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk averse, compliant with rules, and embracing of organisational controls and technology than men. They’re also extremely intuitive and score highly when it comes to emotional and social intelligence, which enables them to remain calm during times of turbulence - a trait that’s required when major security breaches and incidents occur. As cybercrime, terrorism and warfare is increasing, and the number of women in cybersecurity is declining, now is the time to take action. By combining stories, interviews and data with practical advice, the golden rules and checklists, IN Security provides the means to turn things around. When you read this book you’ll understand why the numbers of women have fallen, along with strategies for attracting, identifying, and retaining more women in cybersecurity. This book is essential reading for anyone in cybersecurity or looking to get into it.

BUY THE BOOK HERE

120

WOMEN IN SECURITY MAGAZINE

Author // Jennifer Jin and Marcus J. Carey Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. •

Get the scoop on the biggest cybersecurity myths and misconceptions about security

Uncover which life hacks are worth your while

Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world’s most noteworthy hackers and influential security specialists.

BUY THE BOOK HERE


CHILDREN’S BOOK HOW WE GOT CYBER SMART Author // Lisa Rothfield-Kischner How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary schoolaged children.

COUNTDOWN TO ZERO DAY Author // Kim Zetter Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare-one in which a digital attack can have the same destructive capability as a megaton bomb.

It follows the adventures of two kids Olivia and Jack, as they navigate the online world and tells the story of how they became cyber smart and dealt with their online bully. It provides practical advice to parents and children in how to protect themselves online and look after their safety. The information pulls from realistic online events as the author explains the dangers of the Internet in terms children will understand. It incorporates the challenge of cyber safety in today’s world and addresses this concern in the lives of two

school-aged children and how their parents help navigate their online experiences. This book is a helpful tool for all parents, caregivers and teachers of school-aged children to help start the conversation about online safety and safe online habits. More online safety and cyber bullying information about how we got cyber smart can be found at howwegotcybersmart.com

BUY THE BOOK HERE

Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike-and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

BUY THE BOOK HERE

WOMEN IN SECURITY MAGAZINE

121


OFF THE SHELF

DARING TO DRIVE

CYBER RISK LEADERS

WOMEN KNOW CYBER

A Saudi Woman’s Awakening. The young Saudi woman who stood up to a kingdom of men

A Hands-On Introduction to Hacking

100 Fascinating Females Fighting Cybercrime

Author // Manal Al Sharif

As a leading voice in the cybersecurity space, executive advisor Shamane Tan shares tips on navigating corporate challenges and reveals what C-Suite professionals are looking for in a professional partner

A visceral coming-of-age tale from the young woman who dared to stand up to a kingdom of men. Best known for her campaign work for women’s rights, including the Women2Drive campaign, this is Manal al-Sharif’s fiercely intimate memoir. ‘Future generations will marvel at Manal al-Sharif. Her gripping account of homegrown courage will speak to the fighter in all of us. Books like this one can change the world’ Deborah Feldman, New York Times bestselling author of Unorthodox ‘Manal al-Sharif is following in a long tradition of women activists around the world who have put themselves on the line to expose and challenge discriminatory laws and policies’ Malcolm Smart, Amnesty International News

BUY THE BOOK HERE

Author // Shamane Tan

Cyber Risk Leaders is a compilation of the best stories and wisdom from over thirty C-Suite executives and based on interviews with 70 CISOs. Shamane spent several years speaking to CxOs from different industries, and all over the world, from Australia, to Singapore, Israel, the US and the UK, to bring different aspects of successful leadership to life in this unique book. Shamane Tan unpacks her conversations and explores their unique perspectives, and unlocks their experiences dealing with common challenges and how a modern day CISO adapts and applies their own leadership style. The book shares valuable experiences and useful information for business owners and individuals hoping to sell to the CISO.

BUY THE BOOK HERE

122

WOMEN IN SECURITY MAGAZINE

Author // Steve Morgan Women Know Cyber: 100 Fascinating Females Fighting Cybercrime” features cybersecurity experts from across the globe, with varying backgrounds, who stand out for protecting governments, businesses, and people from cybercrime — and for their contributions to our community. If these 100 leading ladies aren’t proof enough for you, then we encourage you to look at the @ WomenKnowCyber Twitter list. You’ll see thousands of women in cybersecurity — from coders to digital forensics experts to chief information security officers at the world’s largest corporations. The list grows larger every day. Are women underrepresented in cybersecurity? Yes.

BUY THE BOOK HERE


WOMEN IN TECH Take Your Career to the Next Level with Practical Advice and Inspiring Stories

HACKING CONNECTED CARS Tactics, Techniques, and Procedures

Author // Tarah Wheeler Van Vlack

Author // Georgia Weidman

Geared toward women who are considering getting into tech, or those already in a tech job who want to take their career to the next level, this book combines practical career advice and inspiring personal stories from successful female tech professionals Brianna Wu (founder, Giant Spacekat), Angie Chang (founder, Women 2.0), Keren Elazari (TED speaker and cybersecurity expert), Katie Cunningham (Python educator and developer), Miah Johnson (senior systems administrator), Kristin Toth Smith (tech executive and inventor), and Kamilah Taylor (mobile and social developer).

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment

Written by a female startup CEO and featuring a host of other successful contributors, this book will help dismantle the unconscious social bias against women in the tech industry.

BUY THE BOOK HERE

Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.

BUY THE BOOK HERE

TRUE OR FALSE A CIA Analyst’s Guide to Spotting Fake News Author // Mary Aiken, European Investment Bank (Editor) “Fake news” is a term you’ve probably heard a lot in the last few years, but it’s not a new phenomenon. From the ancient Egyptians to the French Revolution to Jack the Ripper and the founding fathers, fake news has been around as long as human civilization. But that doesn’t mean that we should just give up on the idea of finding the truth. In True or False, former CIA analyst Cindy Otis will take readers through the history and impact of fake news over the centuries, sharing stories from the past and insights that readers today can gain from them. Then, she shares lessons learned in over a decade working for the CIA, including actionable tips on how to spot fake news, how to make sense of the information we receive each day, and, perhaps most importantly, how to understand and see past our own information biases, so that we can think critically about important issues and put events happening around us into context.

BUY THE BOOK HERE

WOMEN IN SECURITY MAGAZINE

123


Save the date and celebrate!

THE ANNUAL AWSN WOMEN IN SECURITY AWARDS October 13th 2021, 5-9PM AEST

www.womeninsecurity.source2create.com.au


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.