Women In Security Magazine Issue 2

Page 1

02

MAY • JUNE

BEWARE THE BRILLIANT CYBERSECURITY JERK P16-18

GENDER EQUALITY WONT WORK WITHOUT THE SUPPORT OF MEN, TOO P76-79

DIVERSITY WITHOUT A DIVERSE CYBER WORKFORCE, YOUR SECURITY TRANSFORMATION HASN’T GOT A CHANCE P08-11

W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M


FROM THE PUBLISHER The reality of unconscious bias and what we can do about it

I

have always wanted to work for a cause that would

behaviour, societal expectations, and so on – defying

bring real change to supporting and providing women

our best efforts to be ‘open-minded’. For example,

in security a voice in the industry, and launching this

many people still associate men with being assertive

magazine in March was a big step towards just that.

or a better leader, while women are deemed emotional,

I was ecstatic to see the strong welcome that the first issue got, with many applauding the way we

Within masculine domains, people often judge female

were empowering women with stories of people creating

targets and work products as less competent than

real change. Many welcomed our efforts to inspire and

identically described male targets and work products.

empower women and young girls, and to help break down

Women need to display agency to overcome their

the industry’s stereotypes and smash its glass ceilings.

perceived ‘lack of fit’ with leadership roles, and if they fail

After the launch, some questioned the decision to make

to do so their competency is rated low.

the front cover pink and if it was due to our predominately

Women are also likely to experience prejudice in the

female audience. That’s what really got me thinking.

workplace, the McKinsey & Company and LeanIn. Org

The choice was made unintentionally and based purely on aesthetics – yet when questions were asked, I began questioning whether it did indeed reflect an unconscious bias on my part. Worse still: if I had missed this, then what else have I missed? And if I can stumble into a trap like this despite being a passionate advocate for breaking stereotypes, then how many other people suffer from similar bias without even realising it? Whether intentional or unintentional, unconscious bias is still common in our world – and everyone has some degree of it. This can be as simple as choosing to work with someone familiar or hiring someone you like – which

report revealed, while the problem of affinity bias persists as preconceived notions of people lead them to hire and promote people similar to them. It’s little wonder that the proportion of women in the corporate sector declines dramatically from 47% in entrylevel positions to 21% in the C-Suite level3. The numbers become astonishingly low for women of colour, whereby 18% are in entry-level positions and only 3% in the C-Suite level. If implicit biases are leading us to wrong conclusions, over and over again, it becomes crucial to ask ourselves: how can we slow down, recognise our biases, and improve them?

might seem harmless until you consider that it can hinder

We can start by looking at things like the language we

opportunities available for others competing only on their

use: using language full of male connotations shows

merits.

implicit bias, and is one of the biggest reasons for the

Unconscious bias also causes the association of genders with certain personality traits, colours, imagery,

2

sophisticated and caring.

WOMEN IN SECURITY MAGAZINE

presence of this huge gender gap in the industry. So, too, are media stereotypes, such as male hackers in a hoodie or male scientists with glasses.


Abigail Swabey

Over time, even the smallest societal signals reinforce intrinsic bias – which is why we must work to break down typical societal expectations of what specific genders need to do from an early age. This can be as simple as ensuring that teachers use gender-neutral language, give both genders an equal opportunity to participate in class, and avoid favouring one gender over another. You can also apply the same dynamics in workplace environments, where we need to build and reinforce structures that break down these norms and reduce implicit biases. Think about how your company operates: does it employ unbiased hiring techniques, use genderneutral language in job descriptions, provide equal opportunities to employees, ensure the firm has adequate work-life balance, and promote proper representation and championing of women in the field?

Bias emerges in many ways, and it perpetuates itself unless we commit ourselves to change. And that change is not the sole job of women; it’s a responsibility that everyone carries. So: take some time to look within, and commit to action as well. After all, if you understand your own unconscious bias, you’ve taken the first step to reducing it.

Abigail Swabey PUBLISHER, Co-founder at Source2Create aby@source2create.com.au WOMEN IN SECURITY MAGAZINE

3


CONTENTS Call to Action: We Must Change

12

COVID-19 themed cybercrime

20

APRA CPS 234: What you need to know

50

How parents can keep up with apps and online games

2

CAREER PERSPECTIVES

PUBLISHER’S LETTER

Refining my foundation: career

70

57

Grab the mike, it’s your turn

58

Why more women in cybersecurity

Start-ups, why you need to get security right from the start

transition to cybersecurity

will ultimately make us safer

102

60

Camaraderie 64

08

16 BEWARE THE BRILLIANT CYBERSECURITY JERK!

WITHOUT A DIVERSE CYBER WORKFORCE, YOUR SECURITY TRANSFORMATION HASN’T GOT A CHANCE

WHAT’S HER JOURNEY?

4

WOMEN IN SECURITY MAGAZINE

67 RECRUITERS PICK THE CYBER SKILLS HOTSPOTS

Dr Michelle Ellis

22

Catherine Dolle-Samuel

24

Sarah Young

26

Manal al-Sharif

29

Nicole Murdoch

32

Daisy Wong

34

Nicole Stephensen

36

Amber Umair

38

Lauren Zink

42

Gabrielle Botbol

44

Winifred Obinna

46

Ankita Dhakar

48

52 ATTRACTING WOMEN INTO CYBER TAKES MORE THAN EQUAL PAY

76 GENDER EQUALITY WON’T WORK WITHOUT THE SUPPORT OF MEN, TOO


MAY • JUNE 2021

INDUSTRY PERSPECTIVES

TECHNOLOGY PERSPECTIVES

The year that was 2020:

“Share today, save tomorrow” 104

FOUNDER & EDITOR

an AusCERT perspective on cyber threat intelligence

72

Abigail Swabey

Managing data risks in industrial control systems

Why did the Titanic sink?

ADVERTISING

106

Abigail Swabey

74 The 10 Commandments

A more secure future:the case for

of Human Error

Charlie-Mae Baker 109

JOURNALISTS

encouraging female participation in Australia’s cyber sector

80

David Braue

Why the trends in cryptography are trends?

112

Stuart Corner

Lifecycles within security

114

SUB-EDITOR

Risk-takers and challengers Women in cybersecurity startups

84

Swimming above

AWSN International Women’s Day (IWD) 2021 celebrations

89

CEO frauds

92

DESIGNER

116

The future prospects and

From re-writing job ads to championing women’s achievements

Stuart Corner

Jihee Park Women in Security magazine is published by Source2Create

challenges of AI and ML for cybersecurity 118

ABN 25 638 094 863

Building the foundations of a new data economy

95

How to be digitally secure when working from home

120

www.womeninsecuritymagazine.com contact@source2create.com.au

How Secureworks champions females in senior roles

98

Beware the cybercriminal state in 2021

122

TURN IT UP

132

Source2Create Pty Ltd is the publisher of this magazine and its website (www.womeninsecuritymagazine.com). AWSN is the official partner of Women in Security Magazine

HOW TO GET MORE GIRLS INTO STEM

©Copyright 2021 Source2Create. All rights reserved. Reproduction in whole or part in any form or medium without express written permission of Source2Create is prohibited.

82

02

MAY • JUN E

BEWARE TH BRILLIAN E T CY BE RS EC UR ITY JE RK

P16-18

OFF THE SHELF

136

GENDER EQUALIT Y WONT WO WITHOUT RK SUPPORT THE MEN, TOO OF

P76-79


SUBSCRIBE TO OUR MAGAZINE Never miss an edition! Subscribe to the magazine today for exclusive updates on upcoming events and future issues, along with bonus content

SUBSCRIBE NOW

02

MAY • JUNE

BEWARE THE BRILLIANT CYBERSECURITY JERK P16-18

GENDER EQUALITY WONT WORK WITHOUT THE SUPPORT OF MEN, TOO P76-79


Easy Reliable Resourceful No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY!

charlie@source2create.com.au

aby@source2create.com.au

www.source2create.com.au


WITHOUT A DIVERSE CYBER WORKFORCE, YOUR SECURITY TRANSFORMATION HASN’T GOT A CHANCE by David Braue

Attackers are already benefiting from a diverse set of skills – so why aren’t you?

T

he discussion about diversity in

female CEOs, the company’s review found, while

cybersecurity teams has taken on

just 41 of the Fortune 500 global companies were

a new urgency in 2021, fuelled by

headed by women.

the vaccine-led pivot away from the COVID-19 pandemic and stoked by growing national outrage over the

inequal treatment of women in the workplace. Yet as Australians head back to workplaces that have been indelibly reshaped by a year of home working – and the attendant surge in flexible work – diversity experts are banging the drum to argue that there is no better time for reconstituting businesses to put diversity at the heart of their workforce strategy. A recent survey, by Brisbane-based network-services marketplace Cloudscene, highlighted just how much room for improvement still remains. Just seven of the top 100 service providers in its index have

8

WOMEN IN SECURITY MAGAZINE

“This is representative of a wider conversation on diversity and inclusivity across our industry,” Cloudscene CEO Belle Lajoie said in response to the findings. “We’re making valuable progress but we’re not quite there yet.” Increasing diversity has become a particularly crucial priority for business leaders who have been given the opportunity to reboot change initiatives within their companies: “giving individuals from underrepresented groups a seat at the table means we can truly begin to shape our businesses based on informed and balanced perspectives,” Lajoie said. “Diversity creates the opportunity for innovation and ingenuity, and works to remove bias and improve balance across global organisations in our sector.”


F E AT U R E

With 71% of Australian CEOs optimistic about

Heather Adkins recently told

increasing their organisational headcounts in the

CyberCrime Magazine. “When

next three years, according to PwC Australia’s

I look at our teams today, and

latest CEO Survey, growing executive confidence

I look at the variety of folks

will give companies the change to breathe new life

we have on the team, I can

into diversity initiatives as companies embark on

see how different they solve

widespread hiring sprees.

problems from each other.”

Fully 95% of respondents said they see cyber as a

“I’ve got folks on the team

key threat to business growth moving forward –

who are from India, and China,

suggesting that area could see an overall uptick

and Germany and Romania – just

as executives push to contain their cybersecurity

all over the world – and they’ve all had

exposure as they accelerate digital transformation

different life experiences growing up, and how

programs.

they’re solving problems is really remarkable. And

And with 68% of respondents concerned over availability of key skills – down from 78% last year – widespread fears about cybersecurity exposure means many companies may be willing to redouble

when we’re stuck, we’ve always got somebody who’s got a crazy idea on the team that we can try out. And sometimes they work out better than you than you expect.”

efforts to find or train employees in business-critical

Indeed, surveys have shown that qualified job-

areas, particularly where interruption of skilled

seekers are more attracted to workplaces with

migration has, PwC noted, “amplified the need for

demonstrated commitments to diversity and

local upskilling”.

inclusion.

DIVERSITY = INNOVATION As they seek to maintain the cybersecurity of increasingly digital organisations, executives have a significant opportunity to invest in measures to improve the diversity of cybersecurity recruitment. “Diverse teams bring diverse perspectives, whether it’s gender, ethnicity, background, or life experience,” Google information security and privacy director

“Two-thirds of job seekers consider workplace diversity when they’re considering a job,” noted Australian Women in Security Network (AWSN) founder Jacqui Lostau, adding that 72% of those respondents consider it to be “extremely important”. “Diversity is a lot more than gender,” she added, citing statistics showing that companies with a greater focus on diversity and innovation exceed financial targets by up to 120%.

WOMEN IN SECURITY MAGAZINE

9


“Diversity fosters innovation,” she said, “and it’s good for business.” The promise of better financial returns has been a consistent finding in a series of McKinsey & Company research studies, with the 2020 installment finding that the greater the gender diversity in a company, the greater the chance that company would outperform its rivals with lower diversity. Companies in the top quartile for gender diversity on executive teams, the firm found, are 25% more likely to have above-average profitability than those in the fourth quartile – and this gap had expanded, from 21% in 2017 and 15% in 2014. Despite this competitive advantage, however, representation of women on US and UK executive teams has progressed slowly – from 21% in 2014 to just 28% in 2019; at this growth rate, companies won’t achieve gender equity until the year 2036. For a global industry where agility and proactivity have become key to survival, that timeframe may be too long for many companies – which is why McKinsey & Company recommends companies take five key steps to expand diversity in their workplaces as quickly as possible. These steps are based around two core elements: a systematic, business-led approach to diversity and inclusion, and taking bold steps to strengthen inclusion – which in some analyses is explained as being the how to diversity’s what. “More than ever, flexibility and versatility are becoming the key to success for individuals, companies and countries alike, and a culturally diverse environment is the best way to acquire these qualities,” a recent World Economic Forum analysis noted. A slew of statistics, that analysis notes, confirm that high-diversity organisations deliver substantially more innovation revenue than those with belowaverage diversity scores: “Assumptions need to be challenged, conversations need to be had and corporate culture needs to be updated so that the modern workplace can accurately reflect and support the population of the region.”

10

WOMEN IN SECURITY MAGAZINE

FIGHTING FIRE WITH FIRE As a relative cybersecurity industry newcomer, expanding consultancy CyberCX was able to integrate proactive diversity initiatives into its fundamental policies early on – not only out of a moral obligation to equality but also, chief people officer Snezana Jankulovski said, because diversity “is a business issue”. “There are massive skill shortages in cybersecurity,” she explained, “and it’s about being able to attract the best talent. We want to broaden our talent pool – and for us, what made the most sense was to start off with gender.” Yet despite the potential benefits of increased diversity, many Australian CEOs have yet to prioritise such measures – and this could have a direct impact on the effectiveness of their cybersecurity teams, just when they are needed the most. Some 53% of Australian respondents to the PwC survey said workplace culture and behaviour were the most important aspects of their workforce strategies – well above the 32% global average – and 34% said they would focus on building skills and adaptability.


F E AT U R E

in collaborative problem-solving might be admirable if it weren’t so malicious and problematic. For many cybercriminals, after all, attacking businesses is a game of wits – and to have any chance of matching their advantage, corporate cybersecurity teams need to be equally diverse. “Attackers in a cyber context are a very diverse group,” PwC cybersecurity partner Nicola Nichol, “and we need to increase the diversity of our security teams in response to that.” “Women in our population have disproportionately impacted by the pandemic,” she adds, “and this is a really great opportunity for us to upskill women in particular – but also diverse groups, and indigenous and other communities.” Ultimately, the growing recognition of diversity’s business value – and its

“More than ever, flexibility and versatility are becoming the key to success for individuals, companies and countries alike, and a culturally diverse environment is the best way to acquire these qualities,” a recent World Economic Forum analysis noted.

importance to maintaining a strong defence in areas like cybersecurity – seem set to normalise gender equality in ways that have been elusive for many years. By prioritising diversity and inclusion initiatives as rational targets with tangible results, executives will be able to position diversity alongside other key business indicators – ensuring that women are

Yet just 16% explicitly said that they were prioritising diversity and inclusion – suggesting that many

increasingly seen as essential to companies pivoting towards the ‘new normal’.

Australian CEOs are so focused on resuming

“Our differences are our greatest strengths,” said

business as usual that they risk perpetuating the

Shelley Zalis, CEO of diversity research firm The

same-old same-old despite the magnitude of post-

Female Quotient.

COVID opportunities.

“Diversity is not just a nice to have,” she continued.

This is particularly problematic in cybersecurity,

“Diversity is very important for advancing equality,

where diversity of thought and experience is

improving equity and making sure we’re all seen all

important not only for their business benefits, but

heard, and why not only do we need better data going

because adversaries are already leaning on highly

in better choices of the data – but also diversity

diverse teams – often recruiting cybercriminals from

at the table so that we are making smarter, more

around the world for different tasks, whose success

accurate decisions.”

WOMEN IN SECURITY MAGAZINE

11


MELANIE NINOVIC

CALL TO ACTION: WE MUST CHANGE by Melanie Ninovic

Time and time again, at security conferences,

workplace and industry more welcoming, accepting,

International Women’s Day events, in the workplace,

and safe for women, there are steps we can all take.

women have come forward to share their stories of abuse, harassment, and discrimination.

Firstly, and most importantly, be an ally. If you see a woman being discriminated against in a meeting,

All too often nothing changes. Colleagues don’t

call it out. If she is being verbally, psychologically, or

believe those who’ve come forward, management

sexually harassed in the workplace, call it out. Using

quietly fires the woman to save a man’s reputation,

the power of your voice will help those who do not

or, as we have all seen in recent weeks, the victim is

have the strength to stand up for themselves.

blamed to absolve the accused of any wrongdoing.

Let’s go through what people in various roles can do

Everyone in the cybersecurity industry, no matter their

to help make workplaces welcoming and safe for

gender, can do more: university students, consultants,

women.

analysts, engineers, managers, executives, event organisers, recruiters.

STUDENTS

These issues are very real for women every day of

There are groups you can join that work to support

their careers. They cannot be resolved by speaking about them only on March 8th each year. There are good reasons we in the industry continue to insist there are not enough women in the workforce, not enough women replying to job vacancies, or too many leaving cybersecurity altogether. To make the

12

WOMEN IN SECURITY MAGAZINE

women in cybersecurity: AWSN, WiT, WiTWA, STEM Women, and WiCyS. Here you’ll be able to speak to other women in the industry and find a mentor. Your call to action is to spread the word that these groups exist, and that, although a minority, there are women in cybersecurity.


CONSULTANTS, ANALYSTS, ENGINEERS

who’ve joined your

Even with one or two years

from experts and

team. Send them to conferences to learn network with those in

of experience, you can start sharing what you have

the industry.

learnt and how you joined

the industry.

female talent and

provide them with

Be a mentor to a

opportunities, whether

female colleague or

those be speaking

student. This goes

slots, promotions or

a long way. She will

new projects, to grow

know where to learn

and work outside their

more about a specific

field in cybersecurity,

comfort zone.

what skills she needs

to join the industry,

terms, position titles, and desirable skills (only include must-have

important steppingstones in anyone’s career.

skills) from job descriptions if you’re hiring for a

Encourage women to share their thoughts in

position within your team. •

are female when hiring, especially if using

for their opinion on how to do something. Be

a recruitment agency. And give them the

inclusive.

opportunity to interview with you. If you are hiring

Be a role model. Seeing women present, sharing

for a junior position, take a chance on a female student who has just completed her university studies.

other women to do the same. Seeing is believing. If you are a female in one of these roles, don’t

Call out discrimination or abuse towards a female employee and, depending on the situation, raise it

your organisation. Writing blog posts and sharing

with the perpetrator if it is safe to do so.

MANAGERS/DIRECTORS Show your support and sponsor groups that facilitate the growth of women within cybersecurity.

be afraid to present at a local meetup or within them with your network is also important.

Ensure at least 25 percent of applicants

before you send them out to clients, or ask

their ideas, showing their expertise, will motivate

Remove gendered

or how to progress in her role. These are all

meetings. Have them peer review your reports

Showcase

Ensure there is a process and formal training for handling these types of incidents.

EXECUTIVES It is not sufficient for your organisation to post photos of the women in your company on International

Introduce new junior female employees to a

Women’s Day. It is not enough to say you are inclusive

woman in leadership.

of women, when those same women are resigning

Provide technical and non-technical training for

because they feel discriminated against.

your female juniors, and all graduate students

Take a look at the incredible leadership of CyberCX. The company has sponsored 12 female university

WOMEN IN SECURITY MAGAZINE

13


students with a grant of $10,000 each for their

for in an applicant, give advice on how it can be

studies and provided them with a paid internship

improved. Additionally, if you have spare time,

with CyberCX. Smaller organisations may not be

offer to review the resumés and cover letters of

able to sponsor twelve women, but even one or two

females in your network, especially students.

scholarships/internships will help the industry grow and mature.

or familiarity biases in the recruitment process— initial screenings or interview questions—to

CONFERENCE/MEETUP ORGANISERS: •

ensure they are fair and equal to all applicants.

If you are organising meetups or conferences, be sure to strive to include women in your speakers, organisers and volunteers. It is crucial for upcoming talent, and for those progressing

This also pertains to hiring managers. •

Ask candidates for anonymous feedback on the recruitment process.

in their careers, to see females contributing,

If you are a woman in security experiencing some

sharing and being leaders in their fields. It is

kind of abuse, unwanted attention or harassment,

also a pathway for women to be involved, meet

please seek help. Reach out to a friend, an ally, a support group, counsellor, or more formal channels

people, and grow their career. •

Make an effort to consciously remove any gender

If you haven’t heard of the term ‘manel’, it’s a

that can provide you with the support you need. You

conference panel that consists only of male speakers. This sends a negative signal to the women in the industry that only men have the skills and expertise to present on a certain topic. When organising your panel, it is important for visibility and diversity of opinion to include women. •

Everyone in the cybersecurity industry, no matter their gender, can do more: university students, consultants, analysts, engineers, managers, executives, event organisers, recruiters.

If you are having difficulty finding women to present, either on a panel or as general conference speakers, reach out to the people who run, or are part of, AWSN, WiT and other groups. Use social media outlets such as Twitter and LinkedIn to reach members of these communities.

RECRUITERS •

If you are presented with an application that falls short of the requirements, provide feedback as to why. This is the only way women can learn and progress.

If you are presented with a resumé that does not meet the standards that organisations look

14

WOMEN IN SECURITY MAGAZINE

are not alone. If you can, stand up and speak out; if not for yourself, then at least for others who may have gone through a similar ordeal. Progress has been made, but we cannot be complacent. We need more people to challenge themselves and the status quo and be part of the solution. By doing your bit, you are helping to make the workplace a safer place for us all. www.linkedin.com/in/melanie-cybers/

twitter.com/_darkdefender_


CONNECTING - SUPPORTING - INSPIRING

AWSN Membership Benefits: Mentoring Community Support

Education Careers Events

Visit awsn.org.au for information about exclusive events, programs, and content. Join Australia's largest community of women in cyber and physical security.


BEWARE THE BRILLIANT CYBERSECURITY JERK! by Stuart Corner

T

here’s usually at least one in every organisation. They may be brilliant at the core competencies of their role, but as a co-worker or manager they’re a disaster, because of their personality and the ways in which

they interact with others. Jinan Budge, principal analyst serving security & risk professionals at Forrester Research, leads Forrester’s security and risk research. She says such people have a ‘hero complex’ and can create a toxic workplace culture. She describes them as ‘brilliant jerks’. Budge has studied toxic cultures and brilliant jerks extensively and has published her findings as coauthor of a Forrester Research paper Maintain Your Security Edge: Develop And Retain Cybersecurity Talent. The paper argues that complacency, lack of diversity, and a focus on technologies over people are threats to any business, and says security leaders must invest in professional development and growth for themselves and their staff and create a positive team culture and environment. Budge talked about her research at #Choose to Challenge, an online conference organised jointly by ISACA’s Sydney and Melbourne Chapters and the Australian Women in Security Network (AWSN), held for International Women’s Day, March 9.

16

WOMEN IN SECURITY MAGAZINE


GREATER DIVERSITY NEEDED

almost always related to culture, to having bad

She said her research had identified lack of

bosses, bad organisations.

organisational support as the main reason for a toxic

“Eight out of the top eight reasons that I analysed

culture, followed by: “What I decided to diplomatically

related to bad leadership… Low leadership maturity

call, in our formal research, the ‘hero complex’, but I’m

was huge. People started telling me about the many

calling here the ‘brilliant jerk’.

instances where their manager didn’t know how to

“The brilliant jerk came to me with many different

provide constructive feedback. There was no way to

names. People talked about the messiahs, the rock stars, the invincibles, ‘the bros’… Effectively, these were people who were not team players. They feel like they and only they can solve the problem, regardless of the impact they have on everybody else around them.” She said the impact of a brilliant jerk on an organisation’s cybersecurity could be significant: it can compromise staff effectiveness and lead

“I know from experience, and I know from talking to people that, when you have really bad toxicity you are not going to be getting the budget that you need and the security team’s reputation will be really low. So forget about security awareness and training, forget about engaging with stakeholders. No one will want to talk to you.” -Jinan Budge principal analyst serving security & risk professionals at Forrester Research

to loss of skilled people. And she has made a prediction — in Forrester’s 2021 annual cybersecurity predictions — that within the next five years a CISO from a global 500 firm is going to be publicly ousted and fired for instilling a toxic security culture.

COMPROMISED SECURITY “In my 23 years [in cybersecurity], there’s about 100 reasons why some of my friends and colleagues have left their jobs, and in some extreme cases, left the industry,” Budge said.

do 360 degree feedback. The inability of the CISO to get their team’s buy in, the very basics of leadership were just not happening.” Budge has been researching toxic work cultures by reaching out on social media. “Every single time I posted about toxicity, I got thousands of views and hundreds of comments… People talked about the imposter syndrome, and the need to be right, about low self-esteem and the many reasons that sometimes ego… can manifest into becoming toxic.”

“None of those reasons had to do with not being offered enough skills or enough training. It was

WOMEN IN SECURITY MAGAZINE

17


HIGH COST OF TOXIC CULTURE

“We need to stop rewarding and enabling these tech

Budge said there was no Australian data on the

gods who can barely even talk to anyone, but give

impact of toxic cultures but US research suggested it would be considerable. In one survey, over five years

place for them in our industry, but they can’t be at the

58 percent of US employees resigned because of

top of the stack.”

toxic managers, costing the economy $US220 billion.

James Turner, industry analyst and founder of CISO

She said a toxic culture would have a significant

Lens, summed it up by saying “I had a roundtable with

impact on an organisation’s cybersecurity. “I know from experience, and I know from talking to people that, when you have really bad toxicity you are not going to be getting the budget that you need and the security team’s reputation will be really low. So forget about security awareness and training, forget about engaging with stakeholders. No one will want to talk to you.” Budge asked, via LinkedIn, if people would raise the problem of the brilliant jerk in their workplace, and found the majority of respondents, 65 percent, would not do so. “The leading reason for saying no is fear of the personal impact, and fear of the impact on their mental health.” However 34 percent said it was imperative to speak out: “the main reason they gave was that you need to speak out in order to create change.” She said one of the main causes of toxic culture to emerge from her informal surveys was lack of diversity.

BYE BYE BRILLIANT JERK However, the days of the brilliant jerk may well be numbered as cybersecurity is now critical for most organisations, and front of mind with boards and management. In a panel session following Budge’s presentation, Jacqui Kernot, financial services cybersecurity partner at EY, said: “As a sector, we are too focused on having people with this cybersecurity background managing a large capability when what we actually need is someone who can understand risk, and lead people.

18

them a computer and they’re at home. There’s still a

WOMEN IN SECURITY MAGAZINE

some CISOs last week, and one of the comments was, ‘I’ve never found someone who was so good at their job that they were worth the poison to the organisation’.”


Source2Create Spotlight

Podcasts Here at S2C, we believe content is key. Finding the right way to reach your audience is crucial for success, that's why we're shining a light on our podcasts. Podcasts help build relationships with customers and listeners while being surprisingly cost-effective. We have readily available pre-built packages we like to call S2C ROAR to help take the stress out of planning. We're custom to the core and can mould the perfect podcast package that suits your unique needs. What are you waiting for? Jump in on the hype & get your message out there with S2C ROAR.

REACH OUT TODAY

charlie@source2create.com.au

aby@source2create.com.au

www.source2create.com.au


AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist

C O L U M N

COVID-19 themed cybercrime Cybercrime is big business, thanks to the opportunities created by technical advancement and interconnectivity. This regular column will explore various aspects of cybercrime in an easy to understand manner to help everyone become more cybersafe. Anyone can become a victim of cybercrime, and therefore it is important we all stay aware and remain vigilant to maintain our individual cybersecurity. Email remains one of the main vectors criminals use to obtain account credentials, steal credit card numbers, and to trick people into installing malware on their devices. The approaches used in emails vary. However, the more successful ones exploit situations or events that are known to get a response. With the advent of the global COVID-19 pandemic, criminals now have a worldwide situation sure to garner huge emotional response, making it an excellent avenue to be exploited for illicit gain. Criminals are using our fear and unease about COVID-19 to defraud people, steal credentials or compromise systems with malware. As we all await a successful vaccine rollout, and a return to pre-pandemic days, criminals are sending out emails that spoof health authorities and request potential victims to make payment to secure a vaccine appointment. They are also sending text messages or making robocalls telling people they have been contact-traced and are at risk, so need to log in or access a link for more information.

HOW WE CAN ALL STAY SAFE FROM PANDEMIC-THEMED ATTACKS • Avoid responding immediately to emails or texts. Stop and think about the legitimacy of the communication first. • If a message says you have been part of a COVID-19 contact-tracing activity, verify this separately with the appropriate authority for your location. • Do not click links in messages or emails, locate the official website yourself and find the relevant page to access. • Research how your own location is doing contact-tracing and vaccine rollout so you will be more alert to fraud attempts using these topics If you have been defrauded by cybercrime in Australia you can report this via https://www.cyber.gov. au/acsc/report. Elsewhere, report it to your local police or through the relevant cybercrime reporting mechanism. COVID-19 themed cybercrime is big business – stay safe.

20

WOMEN IN SECURITY MAGAZINE


WHAT’S HER JOURNEY?


However, with freedom comes responsibility, and there was no way I could do this job on my own. So, I had to find some talented university students who could see the problem the way I did and who wanted to be part of something new: challenging the status quo. I initially joined the School of Science at the university as a research assistant, investigating female attitudes towards computing and security. The results showed me that most high school girls knew very little about either, had misconceptions about the people in these industries, and were very much influenced by their

Dr Michelle Ellis Outreach and Engagement Coordinator Computing and Security at Edith Cowan University

parents’ perceptions of suitable careers. I realised it would be difficult to increase female participation in security if girls were ill-informed about the discipline. I could see girls had little knowledge about computing and security and no idea of the opportunities they presented.

I

They had no understanding that various security jobs needed individuals who were not only technically ’m the Outreach and Engagement Coordinator: Computing and Security in the School of Science at Edith Cowan University in Western Australia. I get to work with the university’s aspiring female computing and security students, talented industry women, and a supportive Perth

community. As far as I know the position did not exist before I was appointed, which means I got to make it my own. And I do everything: director, project manager, event coordinator, teacher, mentor, marketing person, finance officer, grant writer, HR, photocopier person and community liaison officer. It is the best job ever! To keep abreast of the different industries I work with I am a member of the Australian Women in Security Network (AWSN), the Australian Computer Society (ACS) and WiTWA, a Perth-based not-for-profit that provides a framework for women in tech to extend their networks and expand their knowledge. I also sit on a local school council and am a member of two teacher groups relating to the Digital Technologies curriculum. To keep up with industry developments I read LinkedIn, Twitter and Facebook groups alongside journals and industry articles.

22

WOMEN IN SECURITY MAGAZINE

capable but also people smart. So, with fire in my belly and a passion for making positive changes, off I marched. We set out to challenge people’s perception of a cybersecurity professional as a lonely hooded male figure in a dark room, and to showcase the importance of being creative, collaborative and clever. I created the hashtag #ChampionsCreatingChampions to get young university women spruiking computing and security, sharing their stories, pathways and aspirations, to high school students and at the same time develop their own soft skills. I also got industry women working with and supporting our university students, so it became a chain with each link supporting and helping the other: champions creating champions. And I wanted to change the attitudes of young female high school students to afford them opportunities to see and experience the computing and security environment. So I applied for, and gained, an Athena SWAN Award from Science in Australia Gender Equality (SAGE). This enabled me to fund travel to regional areas of Western Australia with students to deliver workshops, set up computing and security


W H AT ’ S

H E R

J O U R N E Y ?

As part of International Women’s Day, I invited girls in years 10, 11 or 12 to join us for a Women Using Technology – careers, courses and connections conference. Local Perth companies hosted the day, and leading women from AWSN, ACS, Women in Tech and the Data Sciences delivered two-hour workshops on their respective fields. Amongst other things, the girls listened to, interacted with, and experienced stories, activities, and challenges that women face in their current positions. Comments on the day included workshops, pay students for their work, and to send university students to Sydney to learn about the Girls Programming Network. (GPN). GPN is a wonderful nationwide program developed out of Sydney with a mission to help high school girls gain experience of programming and, hopefully, become keen to learn more. Through interacting with university students and professionals who work in the industry, students also gain an idea of what it’s

“I enjoyed learning about the different ways women came into the industry.” Only when women branch out on their own do they realise there is a gender gap, and it will exist so long as women have to make sacrifices: family over work (therefore financial security); contract and part-time work over full-time permanent positions (and all the trimmings); short courses over paid training and professional development.

like to study and work in computer science. Here in

Trying to find that work life balance is hard. I am a

Perth, we have around 80 to 100 girls sign up each

wife, mum, daughter, aunt and sister. All those roles

term. Each workshop is different and focusses on

are important to me, so I had to sit down one day and

developing something creative or interactive, with and

over a coffee prioritise my life. I wanted to be there

without hardware.

for my family, but I also loved being with my work

We have a number of initiatives at ECU to raise awareness of cybersecurity among school students:

colleagues and the many students I work with. This is a constant struggle, but it seems to be working.

DigiTech, CyberSec and Cyber Challenges. We run

I would like to see women and male champions who

workshops for high school students, teachers, career

have made it to the top ‘pay it forward’ and bring

counsellors and parents in Perth and regional WA.

others up with them, also to shout out if they see

University students develop these workshops and teach basic programming principles, cybersecurity essentials, how to complete cyber challenges and capture-the-flags through hands on interactive workshops. We run after school coding clubs, host schools each week and run holiday workshops for all. Little by little we are breaking through.

inequity. www.linkedin.com/in/dr-michelle-ellis-4bb72493/

GPN - www.sites.google.com/site/girlsprogrammingnetwork/ home ECU Outreach and Engagement activities - www.ecu.edu. au/schools/science/events-and-activities/computing-andsecurity-discipline

WOMEN IN SECURITY MAGAZINE

23


Catherine Dolle-Samuel Business Continuity and Resilience Specialist at UNSW

I

’m a business continuity and resilience (BC&R)

management, architecture and creative practices,

specialist at the University of NSW (UNSW),

supporting continuation of teaching at field sites all

which means I’m responsible for managing the

over Australia and students and staff overseas, and

university’s business continuity and resilience

ensuring continuity of more mundane (but critically

program. This involves managing a full continuity

important) processes such as payroll.

& resilience lifecycle program - understanding critical functions, developing recovery plans, identifying improvements in the resilience of processes and at enterprise level for the organisation as a whole.

life leadership team, the student union and numerous faculty and student societies to deliver a COVID safe student orientation week (with upwards of 10,000

Like many people in cybersecurity, I came to it with

students engaged in on site activities at any given

a very different background: a bachelor’s degree in

hour).

history.

Since COVID-19 hit there has been rather less of the

Part of my current role requires that I manage

normal programming because my colleagues are

training, coaching and awareness programs for the

experiencing what is, hopefully, the longest period of

organisation. This involves managing and reporting

disruption and recovery in their lifetimes.

on exercises designed to test the ability to recover designated processes and the systems and people on which they depend. With 8 faculties and 6 divisions, across 3 major sites, this can be a challenge. At times I also have to undertake incident response and crisis management. On such days I have to drop everything else. The complexity and diversity of my role continues to excite me. Every day is different. Because I need to understand the critical functions of the organisation, and how its people can and do respond to incidents, I have pretty good insights into the entire organisation, executive decision-making and strategy. This is one of the privileges of working in business continuity and resilience. I work with incredibly intelligent and diverse groups. I can be supporting continuation of research – which can include complex and expensive equipment, cold storage or clinical environments to waste

24

Recently, I worked with the the academic and student

WOMEN IN SECURITY MAGAZINE

This year my focus is on analysing the data created in the past year to gain good insight and understanding for future disruptions and developing training, awareness and exercising programs for deployment in 2022. I got into business continuity via various corporate services roles in Australia and overseas. Working with boards and CEOs as an executive assistant and managing human resources, I developed a broad knowledge of organisations, good communication skills and an awareness of how to facilitate. The executives I worked for in earlier roles were engaged in continuity and crisis management so I became familiar with business continuity planning and decided to apply for a BCP position. Like my previous roles it required working with central/corporate services and with boards or their equivalent in an admin role, so I knew how executive decision-making worked, and I had a broad


W H AT ’ S

H E R

J O U R N E Y ?

understanding of organisations, both of which were

solutions, be ready to listen, and find yourself a good

key to a business continuity role. Also, my training

mentor.

as an historian enabled me to understand the interconnectedness of critical functions.

My first BC manager, Graham Nisbet, was an incredible guide and mentor, and remains so to this

I’d identify the key factors for success in a BC&R

day. The All Finance Forum group — an industry

role as being relationship building and stakeholder

business continuity and disaster recovery knowledge

management skills, an understanding of executive

sharing group made up or people from banking,

decision-making at the highest levels of the

financial services and insurance — provided excellent

organisation and the ability to see things from

knowledge sharing and problem-solving opportunities

multiple perspectives.

to me as a new starter in the field, and involvement in

However, probably the most challenging aspect of a BC&R career is the lack of

broader organisational resilience work across sectors provided incredible insights.

flexible or part time work. Most roles are not offered as job shares and have some on-call requirements (without good back up in smaller organisations). My first role in business continuity was at Allianz Australia but I left BC&R temporarily when I had a young family. However, I kept active in the BC profession by volunteering for the NSW

“I got into business continuity via various corporate services roles in Australia and overseas. Working with boards and CEOs as an executive assistant and managing human resources, I developed a broad knowledge of organisations, good communication skills and an awareness of how to facilitate.”

Business Continuity Institute as a forum leader, for conference committees, and as a member of the 20/20 Think Tank on Organisation Resilience. I was working casually at UNSW as an academic when my current BC&R role was mentioned in my network. At that time, I was lecturing in remuneration, performance management and tutoring in organisation management, international human resources management, professional skills and ethics at undergraduate and post graduate levels. The BC&R at UNSW offered the ability to work flexibly and there was no requirement to be on call 24/7, so I applied. The NSW Business Continuity Institute is actively encouraging people to join the sector and it is training leaders, when recruiting, to understand that business continuity requires the right skill sets, not formal training. So, if a role in business continuity appeals, go to industry events, get a sense of the key issues and

As with other areas of cyber security BC&R needs more women. Gender diversity means diversity of thinking, and of approaches, which increase organisational resilience. Academic research demonstrates that diversity of perspective enables organisations to make more effective decisions for all stakeholders. I still teach professional skills and ethics in the Master of Commerce program at UNSW. This is a casebased course and every case I use is drawn from actual public company experiences often stemming from a crisis instigated by poor values and corporate governance. In many instances, failure to consider alternative perspectives or ways of doing things was a huge contributor to the problem. www.linkedin.com/in/catherine-dolle-samuel-7832669/

WOMEN IN SECURITY MAGAZINE

25


W H AT ’ S

H E R

J O U R N E Y ?

MY CYBERSECURITY JOURNEY Sarah Young Senior Program Manager, C+AI Security Customer Experience Engineering (CxE) at Microsoft

our customers. And I report back to the Azure Sentinel product group on feature requests from customers.

M

I’d been working in a different role within Microsoft on several projects. When my current position came y university qualification, a Bachelor of Arts in history, was

up I applied and was accepted. I haven’t looked back. The work is really interesting and there are so many

about as far from cybersecurity

opportunities to grow.

as you can get. I don’t think it has

I get to help people; internal Microsoft teams, our

held me back in my career but I

customers, and our partners. And there’s great variety

did have to do quite a bit of self-

in what I do. No two days are the same.

study that might have been unnecessary had I studied a technical degree.

Generally my day will consist of meetings with customers to discuss and solve their technical

Over the years I’ve gained a number of industry

blockers, meetings with Microsoft teams to discuss

certifications: Cisco – CCNA and CCNP; CompTIA

new feature requests, researching and working

A+; CISSP; CCSP; CISM and various Microsoft

on technical solutions for Azure Sentinel, creating

certifications.

content for webinars, blog posts, and more.

Today I’m with Microsoft as a Senior Program

Getting to where I am has not been without its

Manager for Azure Sentinel in the Customer

challenges. Having a strong support network

Experience Engineering team. It’s a cloud-native

both professionally and personally has helped me

security information and event management (SIEM)

enormously, as has finding good mentors to support

platform that uses built-in AI to help analyse large

me in different aspects of my career and provide

volumes of data across an enterprise.

different perspectives.

I work with customers to remove technical blockers

I have several mentors, some within Microsoft and

to Azure Sentinel deployments, create collateral that

some external. It doesn’t have to just fall to one

unblocks certain scenarios and that can be used by all

person to mentor you. Ideally you want a mixture of mentors who can support you in different aspects

26

WOMEN IN SECURITY MAGAZINE


“Getting to where I am has not been without its challenges. Having a strong support network both professionally and personally has helped me enormously, as has finding good mentors to support me in different aspects of my career and provide different perspectives.”

This has become a little trickier over the past 12 months, but attend meetups, conferences, etc. and meet as many of your career and provide different perspectives. Equally, a mentoring relationship doesn’t need to be forever: you may need mentoring through a specific challenge or problem that your mentor specialises in. I’ve been fortunate to have been given some good guidance over the years. These particularly stand out. • Never surround yourself with people who just tell you you’re great: everyone can improve. Make sure you seek feedback from people who will challenge you. • Be kind: you don’t know what others are going through (especially relevant now). • In professional situations try and take the

people as you can, even if those meetings are online. It’s a good way to learn what’s out there in the security space and the kinds of roles you might be interested in. One day the person you’re chatting to, face-to-face or online, might be looking at your CV and thinking “Oh, wait, I’ve met that person before”. I am quite an introverted person and networking doesn’t come naturally to me, but it really does do wonders for establishing yourself within an industry and moving forward in your career. And I’d particularly encourage more women to pursue a cyber security career. We need as much diversity

emotion out of things. Getting emotional can

as possible in cybersecurity to counter the many and

prevent you from moving past challenges in a

diverse threats we face.

constructive way. And my most important advice to anyone considering moving into a career in cybersecurity: network, network, network!

Azure Security podcast https://aka.ms/azsecpod

twitter.com/_sarahyo

WOMEN IN SECURITY MAGAZINE

27


EXPRESSION OF INTEREST SPONSORSHIP Source2Create is thrilled to announce the 2021 Australian Women in Security Awards. This hybrid event will be a glamorous Gala Awards evening based in Sydney. We will be welcoming our guests in person as well as via live stream. To be a part of this energetic initiative register your interest today for sponsorship opportunities.

Deadline for sponsorships: 20th May

I’M INTERESTED!

28

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

Manal al-Sharif Author of Daring to Drive

The Chief Information Security Officer makes sure cybersecurity remains an agenda item for the University’s Council, for the risk committee and for internal audits. CISO works to get buy-in

I

for cybersecurity from management and from the faculties, and to get them to understand their roles in am a Cyber Security Strategist and enthusiast. As

managing the cyber risks the university faces.

a cyber security strategist, I lead the development

As head of the cybersecurity directorate, I oversaw

of the organisation’s cyber security strategy

cybersecurity day-to-day activities. This included: new

and roadmap that aligns with the business

projects to uplift the cybersecurity capabilities of the

objectives and focuses on mitigating the cyber

university; the day-to-day work of identity and access

risks with minimum investments. Inputs to take

management; advising on new projects; managing

into consideration in developing an effective cyber

risks and incidents.

strategy are the overarching business strategy, laws and regulations, previous audits, cyber policies, threat intelligence, recent cyber incidents, and calculated cyber risks, just to name a few. My strategy leverages international cyber security frameworks such as NIST CSF, to foster cyber security communications amongst both internal and external organizational stakeholders. Frameworks allow us to measure the cyber maturity regularly and set the desired maturity target at organization and IT levels. It also provides a clear roadmap for each part of the business and a way to monitor the progress of their short- and longterm cyber security initiatives. My recent role was the acting head of cyber security and the CISO at one of the group of 8 Australian universities. I filled this role for about seven months. I had to wear multiple hats to fulfil all my responsibilities.

For a CISO, seeking support and buy-in, is the most challenging part of their role. You can’t protect an organisation the size of a small city on your own. The CISO’s priority should always be: “To identify and protect mission-critical assets (Information, Technology and Users) from threats that can impact the cyber security Triad; Confidentiality, Integrity and Availability (CIA)” Nothing I did would have been achievable without my team and mentors. In total there were 22 positions in our team, but many were unfilled. Team members are passionate, creative, outgoing, and very driven. When I sat down with them, I learnt a lot from their different points of views and their different experiences. We said the C in Cyber stands for challenging, collaboration, communication, creativity, and critical thinking, and those were our values. We had a list of 10 team cyber aspirations:

WOMEN IN SECURITY MAGAZINE

29


1. We have one common purpose: to enable and

COVID-19, we come to make sure that people can

support the university by protecting it from cyber

rest assure their information is safe, wherever they

threats.

lay. Achieving cyber security is a moving target, what

2. We have clear goals and high values. 3. We celebrate our diversity because it reflects the university that we protect. 4. We work in a non-hierarchical structure because we are trusted and empowered.

makes it exhaling is also what makes it rewarding. As a student, I was so interested in math and physics. I wanted to be a scientist. I ended up being a computer scientist. The introduction of the Internet back in Saudi Arabia faced a waging war from the political and religious establishment that controlled

5. We have got each other’s back in ups and downs and we know how to lift each other. 6. We speak our mind, we challenge, and we question because this is how we grow. 7. We maintain a healthy and safe environment for

what we read or watched. I was so curious to explore all the blocked political and religious content. You see in Saudi Arabia, we grow up with answers that couldn’t be questioned, I had questions that I wasn’t allowed to find answers for. So, I spent my free time trying to bypass all those restrictions. And yes, I found

ideas and opinions to be exchanged freely and

my answers. I didn’t know that was called “hacking”.

effortlessly.

Education and Internet were my window to the world.

8. We show appreciation and lend a hand when

My first job as a summer student, I worked in Help Desk. Building machines, troubleshooting, and training

needed. 9. We believe mistakes are opportunities to learn. 10. We value when our contributions are acknowledged and when our time and space are respected.

end-users. My first job as a professional was in a proper cyber security division. In 2002, I graduated with first honor and went to join the newly established cyber security division at the Arabian Oil Company. My first professional role was a pen tester.

Separately, and voluntarily, I champion the role of women in cybersecurity and advocate for greater diversity. Globally, women make 10% only in the cyber profession.

Throughout my career I have built my confidence simply by being myself, following my passion and not trying to prove myself to other people, but that was a difficult lesson to learn. You can control your

I believe the working environment in Australia is still not ready for women in leadership positions. We endure it. We put a lot of emotional labour into

own intentions and follow your own passions and purposes, but you can’t control how others perceive you.

creating an environment that respects us and sees us for who we are, to calling out the BS, trying to build confidence and to get more diversity in the workplace. There are so much unconscious biases men in leadership need to destroy, otherwise they will destroy women as they come into those positions. I enjoy the exciting challenges this role throws at me. As the world invests more in digital transformation in response to

30

WOMEN IN SECURITY MAGAZINE

“Mentors are fantastic to help build selfesteem, confidence, and knowledge, but sponsors are more important than mentors. It is they that help you get to where you want to be.”


W H AT ’ S

H E R

J O U R N E Y ?

So, it’s OK to speak your mind, to make mistakes, ask

have new technology that you

stupid questions. However, you do need to be in the

need to learn how to protect.

right environment. In an unhealthy environment it can

So, unless the schools and

backfire badly and cause you a lot of harm.

tech makers start embedding

I also rely heavily on what I call my ‘tribe of mentors’: people I trust, people I admire, people who I know will help me. I also owe a lot to woman sponsors in my life. Women who have been there for me, who have advocated for me, pushed me up, helped me. I think every woman who wants to make it should have a sponsor, someone who is influential, who can help you negotiate for a better salary, a better position, and speak up for you when you are not there. Mentors are fantastic to help build self-esteem, confidence, and knowledge, but sponsors are more important than mentors. It is they that help you get to where you want to be.

security while teaching and building tech, the world will need cyber. So, if you are a woman thinking of a career in cybersecurity, do it. We need more of you. Teams with a balanced number of men and women are better at meeting deadlines. They have more creative solutions to problems. And I think collaboration and communication are healthier, because women take the time to build relationships, to build communication. Women take the time to understand, to build relationships and build structure. So yes, the world with “more women, is a more secure world”.

A career in cybersecurity is rewarding, but it is challenging. You will lose sleep sometimes, you will always be ahead of the hackers, you will always

www.linkedin.com/in/manal-alsharif/ www.manal-alsharif.com/

WOMEN IN SECURITY MAGAZINE

31


After graduating I worked for a number of law firms before starting EAGLEGATE Lawyers. Jumping into the law as a mature age student and then starting my own firm, meant I had to have confidence in my own abilities..

Nicole Murdoch Founding Director at EAGLEGATE Lawyers

However, I could have achieved none of this without my husband. He has supported me all the way, despite neither of us knowing what I was taking on when I embarked on my law degree. And his support of me starting and running my own firm has been invaluable. Once I got into law I discovered my skills in encryption and IT were very useful for handling cases that involved confidential information and data theft

I

and any case that required forensic services. I’ve also applied my skills and knowledge of IT in a number of ’m an intellectual property and technology lawyer with my own practice, EAGLEGATE Lawyers, a firm I founded in 2018. I assist clients to protect and commercialise their businesses and ideas. I love technology and very much enjoy helping people turn their ideas into viable and saleable

businesses. I came to the law by making a huge leap from a career in IT. My first degree was a Bachelor of Engineering in computer systems engineering and I worked for 10 years in various IT roles, including encryption. I loved the area of technology I worked in, but was more interested in the business development and legal side of things. So I took a huge leap, quit my well-paid job and enrolled as a mature age student in a full-time law degree course, Juris Doctor.

32

WOMEN IN SECURITY MAGAZINE

roles outside my law practice. I have been a director of the Australian Information Security Association and I lecture often on information security and privacy. My confidence gets a boost when clients thank me for my assistance, and realise how much value I have added to their matter, a value which a lawyer without my IT background could likely not have provided. The main part of my work involves drafting commercialisation and litigation/court documents, responding to emails and talking with clients. As EAGLEGATE is my own firm I am also responsible for all aspects of its operation, including marketing, client care, and alot of administration, particularly in terms of trust fund compliance. I also attend networking events to further the business and try not to neglect my family or friends too much.


W H AT ’ S

H E R

J O U R N E Y ?

“My confidence gets a boost when clients thank me for my assistance, and realise how much value I have added to their matter, a value which a lawyer without my IT background could likely not have provided.”

I have been fortunate to have had some wonderful

is well planned out but also agile enough to change

mentors, and some wonderful bosses who have

when opportunities present themselves.

nurtured my development and demonstrated to me the type of person a lawyer can and should be. I have also had some horrid bosses, and some horrid colleagues: people who demonstrate what not to become. I’ve also suffered from stereotypical attitudes to women that are still very much present in law. I’ve had my suggestions ignored, only to have a male (sometimes even someone junior to me) state the same thing and be told it was a great idea. And unfortunately the view persists that an olderlooking woman is “over the hill” and a younger looking woman does not have sufficient experience for the job, whereas a man with grey hair is seen as

Surround yourself with those who support you, but not those who only ever agree with you – those people won’t challenge you or help you grow. The worst mistake I see made in careers is that the person fails to grow. There is a difference between having 10 years’ experience and having 1 year of experience, 10 years in a row. Sometimes we learn through our own bitter experience, sometimes we learn through watching the experience of others. If there is anything you do, make sure you learn and grow. You will have setbacks, but how you overcome those setbacks and grow from them defines you.

knowledgeable and experienced and a younger man not questioned over his experience. This attitude needs to be overcome before women will receive fair treatment in the workplace. No career is without challenges. A career is built over time. It is a marathon, not a sprint. So, my advice to

www.linkedin.com/in/nicolemurdoch/ www.linkedin.com/company/eagle-gate/

www.eaglegate.com.au/

women is to plan a long term career strategy that

WOMEN IN SECURITY MAGAZINE

33


In fact my marketing skills are very transferable to my current role. A large proportion of it is about engagement, bringing people on the journey to

Daisy Wong

greater awareness of cybersecurity and influencing

Cyber Culture and Engagement Lead at Department of Premier and Cabinet (Vic)

no longer just an IT problem but a business problem,

them so they acknowledge security as a serious risk, and so they realise we can all become victims of cybercrime. I have some of my mentors to thank for helping me understand that my marketing skills and experience could be applied to my security roles. These mentors

I

believed in me and, when I was looking to change roles, gave me some great advice that proved to be critical to my career success. ’m the cyber culture and engagement lead in the Victorian Government’s Department of Premier and Cabinet. I get to help non-technical staff understand complex cybersecurity concepts so they are able to protect themselves from cybersecurity risks and threats.

In a previous role I was told constantly that, as a female, I was not technical, that cybersecurity might not be the industry for me, and there was no opportunity to progress my career. Those opinions really impacted my confidence, but were completely untrue. I undertook further study and found mentors

This role might seem a far cry from my first degree,

who believed in me and who provided guidance on

a Bachelor of Business with a major in marketing,

the transferability of my skills and where I could make

but it gives me an opportunity to use some of my

improvements. They were invaluable.

marketing skills and knowledge. I joke that I am marketing and selling cybersecurity, hopefully to get people interested, to get them to heed advice, and to protect themselves and those around them.

There are definitely non-technical roles within the security industry and, if anything, we need more people, especially women with interpersonal skills

“My advice to anyone interested in cybersecurity is see it not as a role requiring technical knowledge but as one that calls for communication skills and the ability to influence others.”

34

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

who are able to translate technical information and

There’s plenty of variety in my role. Some days I

talk to non-technical people about security issues.

will be facilitating face-to-face training sessions, or

Women are just as capable as men in both technical and non-technical roles and should be given the same opportunities to progress their careers in the security industry. I also believe closing the gender gap and creating a more diverse workforce will lead to greater diversity of thought, more thinking outside the box, and new and innovative ways to solve problems. I have now completed my Graduate Certificate in Cyber Security and would like to believe I have a little more technical knowledge. I’m also undertaking the

I will be in back-to-back meetings discussing the cybersecurity strategy and how cyber culture, training and awareness fit into that overall strategy. On other days I will be creating content such as newsletters or infographics that reflect current cybersecurity threats. No two days are the same. It can be quite busy at times, but I thoroughly enjoy it. My advice to anyone interested in cybersecurity is see it not as a role requiring technical knowledge but as one that calls for communication skills and the ability to influence others.

SANS Institute course MGT433 – SSAP: Managing

Of course it is important to understand cybersecurity

Human Risk: Mature Security Awareness Programs,

concepts such as phishing, vishing and even

which I will complete in April.

cybersecurity frameworks such as NIST, but the soft

I did not plan to have a career in cybersecurity. I

skills are equally important.

started my career as a graduate at IBM and worked in

You may understand something very well technically,

the data centre as a change coordinator. I then joined

but if you are not able to explain it in simple language,

NAB in their security assurance team and managed

you are going to find it difficult to influence others and

the pentesting team’s day-to-day operations.

change behaviours.

During this time, I realised few people understood

For example, if you are able to explain to staff the

cybersecurity and I took it upon myself to explain it

impact of clicking on links in phishing emails in

in layman’s terms, and the more I did that, the more I

simple language, hopefully you will change their

enjoyed it.

attitudes, raise their awareness of the dangers of

I then moved to the Victorian Department of Environment, Land, Water and Planning (DELWP) as a project manager for the cybersecurity program.

such links, deter such behaviour, and ultimately reduce the incidence of cyber incidents caused by phishing emails.

One of my projects was to develop a cybersecurity awareness campaign. It made me realise how much I enjoyed training. So when my current role in the

www.linkedin.com/in/daisywong127/

Department of Premier and Cabinet came up offering the chance to increase my remit from one department to the whole Victorian Government, I immediately applied.

WOMEN IN SECURITY MAGAZINE

35


My first task was to develop a method for conducting privacy impact assessments, in that case a way for government organisations to identify and address privacy risks associated with their proposed programs or initiatives. After a very rewarding time in public sector privacy and regulatory oversight roles, I decided to hang out my own shingle, and Ground Up was born. By choosing privacy I opted for a career aligned with

Nicole Stephensen Principal Consultant at Ground Up Consulting

my values, and that’s been really important. It gets me out bed! Privacy celebrates and protects the notion of human agency – the idea that a person is best served by their government, their service provider or whomever, when they have visibility and can exercise choice and control over what happens to

I

their personal information. At a practical level, I do my research and keep my ’m the director and principal consultant of Ground

knowledge current. I welcome criticism, because

Up Consulting, a privacy consultancy focused on

if someone offers a critical point of view on my

privacy by design and corporate privacy fitness

work, they have engaged with it, and that is so very

that I founded in 2011.

valuable. I volunteer in areas of my passion, such

As principal consultant I lead the firm’s services that help organisations build privacy capacity.

I focus on privacy acculturation and on helping

perspective fearlessly, but with the utmost respect for my audience.

organisations to manage personal information

So, my career has been in privacy, not information

in compliance with the law and with community

security, but they are complementary disciplines, and

expectations; things like privacy impact assessments,

as my career has progressed, the line between the

developing policies and processes, and delivering

two has tended to blur.

training.

There is a saying amongst privacy professionals that

I love my education role: getting out and sharing

you can have security without privacy, for example for

what I know about privacy and its interface with

public safety surveillance in a tightly-controlled police

information security, ethics, trust and good decision-

state, but you cannot have privacy without security. I

making. I really enjoy speaking at conferences and at

believe this to be true.

industry or public sector forums. Most of all, I enjoy

Also, privacy is constantly evolving, especially in the

speaking to students. I always hope at least one student will leave a lecture with more than a passing interest in privacy, develop a passion for the subject, and take this into their chosen career. My interest in privacy was sparked when I was an undergraduate, by a university professor who was a passionate privacy advocate. After graduating I looked for public policy work that included privacy, and was offered an internship with a privacy regulator.

36

as children’s privacy. Most importantly, I offer my

WOMEN IN SECURITY MAGAZINE

digital era where innovation and deployment of new technologies, including those that rely on personal information, are outpacing government regulation. Privacy offers many career opportunities because it intersects with so many disciplines. The intersection between privacy and information security, for example, offers opportunities in privacy engineering, technology design, contracts administration, risk management, information governance, community engagement and training.


W H AT ’ S

H E R

J O U R N E Y ?

There is nothing like geekingout with other privacy pros on the topics that interest us most. I think it’s affirming to hear both like-minded and critical points of view. I’ve also This means you can specialise and carve a niche for yourself. A great way to learn more about privacy as a profession, and to connect with others who are also

made a point of reading a lot. I’ve always felt the need to learn and stay on top of what’s happening in my field.

dipping their toe into this exciting field, is to join the

I have also enjoyed, at various points in my career

International Association of Privacy Professionals

and life, guidance — which I have always believed

(IAPP).

to be an act of generosity, not of ego — through

And I would encourage more women to pursue privacy as a career. Any profession that is dominated

mentoring and a warm collegial connection or a ‘nudge’ down, or out of, a particular rabbit hole.

by one point of view or one group of people is

My cyber spirit guide, Amanda-Jane Turner, reminded

missing a critical opportunity to learn, innovate, excel,

me recently that I can make 180-degree turns away

and attract new membership.

from pursuits and people that no longer align with

However, its rapid evolution makes privacy a challenging field to work in if you want to take a break, as I did to start a family. In such a fast-

my values. And my heavenly guide, my Mom, taught me powerful lessons about grace under pressure and “catching flies with honey”.

paced industry, where it is vital to stay on top of

I’m also deeply grateful to my mentors and now

technological, legislative and other changes, this

lifelong friends: Malcolm Crompton, former Australian

break caused some self-doubt, and a feeling of

Privacy Commissioner and founder of Information

isolation from my professional community, simply

Integrity Solutions; Parry Aftab, globally-renowned

by me not being physically present at meetings, or

cyber lawyer and advocate for children’s online

speaking at conferences and other events.

safety; and Dr Katina Michael, Professor, Arizona

Of all the obstacles I’ve faced in my career these stand out. Interestingly, they are echoed by many of

State University and researcher on the socio-ethical implications of emerging technologies.

my colleagues who also took a professional pause when starting their families. My biggest confidence builder has been involvement with the peak professional bodies most closely aligned with my work. This has allowed me to meet

www.linkedin.com/in/nicole-stephensen-privacymaven/ www.groundupprivacy.com.au

others on the same career path and learn from them.

WOMEN IN SECURITY MAGAZINE

37


always looking for opportunities to acquire more certifications and credentials because I believe it is a great way to enhance knowledge.

Amber Umair Security Operations Officer at Transport for NSW

For example, CISSP certification allowed me to dive deep into information security domains while also giving me a sense of belongingness with the security community. Since then I’ve built up my expertise with several certifications: ITIL Version 3 Foundation; Juniper Certified Internet Associate and Internet Specialist; and Six Sigma White Belt Certification.

I

My fascination with security allowed me to start my research career with the University of Technology knew even in my early school days, that I had a passion for computers and digital technologies. I became familiar with network communications while studying computer science at the university. Soon after my graduation, I acquired

my first CCNA certification. My interest in network communications led me to my first internship, followed by my first job as a Network Engineer for Habib Bank in Pakistan. At that time, a female in network operations was a “shock” to many. There were always questions about my decision of choosing this male-dominated industry. However, it is a fascinating world, where the possibilities are endless, so I never looked back. Soon after, I had the opportunity to move into a network project-based role with IBM Pakistan, where I understood the true importance of technical and soft skills in an organisation. I also had the opportunity to learn about the multifaceted network architecture and the security domain. My interest in network and security architecture led me to join a flourishing information security team at United Bank Limited Pakistan. I took on multiple security projects, including vulnerability management solutions, SIEM and security awareness. I am

38

WOMEN IN SECURITY MAGAZINE

Sydney. My research was focused on information forensics using machine learning. During my research tenure, I published research articles, participated in conferences and taught cybersecurity and information warfare units at UTS and ECU. I kept myself involved in the cybersecurity industry by actively volunteering and participating in (ISC)2 Sydney chapter events and working on short term forensics-related projects. After completing my doctorate, I felt the urge to get back into the industry and contribute my knowledge and experience to the cybersecurity community. Today I am a Security Operations Officer at Transport NSW responsible for providing operational security activities across the agency and ensuring secure operational practices are in place. I undertake proactive monitoring and use a variety of tools and processes to ensure prompt coordination of responses to security alerts and incidents. My day starts with a “Stand up security operations centre meeting”. It gives me an insight into the overall state of the environment. Apart from this, every day is different because I never know what priorities will arise. On most days, I have a couple of reviews planned to ensure security practices and procedures are in place


W H AT ’ S

H E R

J O U R N E Y ?

to safeguard the organisation’s assets. New threats

Meeting other people working in cybersecurity has

or vulnerabilities are communicated, escalated and

helped me immensely to boost my confidence. I was

remediated according to the priority of the affected

fortunate to be one of the founding members of the

assets. My work also requires a lot of coordination

(ISC)2 Sydney chapter, and networking with industry

with relevant stakeholders, information gathering, and

experts at chapter events helped me greatly. These

artefacts analysis.

events provided an insight into Australia’s security

There’s no chance of stagnating in my role; staying

community and its challenges.

on top of security trends, incidents and attacks,

I would advise anyone in cybersecurity or considering

is a constant challenge. But this challenge is also

a cybersecurity career to focus on building their

an opportunity for professional development. This

network and to continue learning. The Australian

dynamic nature of cybersecurity suits my “ever

Women in Security Network, (ISC)2 chapters, ISACA

learning” nature. I’ve always been ready to learn new

and AISA(AISA) present amazing opportunities to

things, to ask questions, to move out of my comfort

meet people and learn from their experiences. As a

zone. I believe these attributes have been key to my career success, along with being willing to listen to everyone’s point of view and to take a chance, never knowing where it might take me. I’ve faced challenges like gender discrimination leading to selfdoubt, at various stages of my career. The presumption that, as a woman, I’m unsuitable for a male-dominated technical role has often exacerbated my

“The presumption that, as a woman, I’m unsuitable for a male-dominated technical role has often exacerbated my doubts about my capabilities. I’ve tried to counter these issues by surrounding myself with people who are uplifting, motivating and empowering.”

doubts about my capabilities. I’ve tried to counter these issues by surrounding myself with people who are uplifting, motivating and empowering. I have learned that trying to be a perfectionist can lead to procrastination. I have tried to overcome this challenge by sharing tasks and getting early feedback from seniors or colleagues. Throughout my career, I have been lucky to get guidance from many talented people: my seniors,

cybersecurity professional, always be ready to adopt change and learn new technology. I firmly believe there should be balance in every aspect of life, which is why I am a strong advocate for gender balance in cybersecurity The proliferation of more women in cybersecurity will allow them to feel more empowered.

colleagues, teachers and, above all, my life partner

There will be more opportunities for empathetic

who is an IT project manager by profession. I have

relationships and for a culture of mutual support.

realised that listening to and discussing other

Above all, cybersecurity will benefit from the analytical

individuals’ perspectives and their experiences has

skills of women technologists.

helped me greatly to evaluate and plan my path. Obviously, there is risk involved, but that’s the exciting

www.linkedin.com/in/amberumair/

part! www.amberumair.com

WOMEN IN SECURITY MAGAZINE

39


WOMEN IN SECURITY NOMINATIONS & JUDGES NOMINATIONS NOW OPEN. The Annual Australian Women in Security Awards showcases the everyday heroes who are demonstrating real leadership and ambition in their ideas, passion and drive to combat some of the issues we face in the current cyber landscape. Our mission is to continue to inspire future generations to work in the IT security/cyber/protective security fields. And to elevate technical skills, impactful solutions, and commitment to giving back to the community. Honourees will be recognised in October 2021 at the Annual Australian Women in Security Awards.

2021 CATEGORIES • Best Program for Young Ladies in Security

WHY NOMINATE •

To identify rockstars

To celebrate ‘hidden’ security superstars

To lift and empower the entire company

• Unsung Hero

To express admiration for fellow co-workers

• The One to Watch

To pause and express your gratitude

• IT Security Champion

To pay it forward - and give back to the community

• Best Place to Work for Women in Security

• Australia's Most Outstanding Woman in IT Security • Best Security Student

THE NOMINATION PROCESS IS 4 EASY STEPS AWAY

• Best Volunteer • Male Champion of Change • The One to Watch in Protective Security • Protective Security Champion • Most Outstanding Career Contributor in Protective Security • Australia's Most Outstanding Woman in Protective Security • Best Female Secure Coder

1

2

3

4

Your details

Details of the nominated individual, team, or company

Choose award category

Submit personal nomination & answer relevant questions

(if not your own)

(Multiple award nominations need to be done individually)

NOMINATE TODAY


INTRODUCTION TO OUR 2021 JUDGING PANEL MICHELLE PRICE

CATHERINE DOLLE-SAMUEL

CEO AustCyber

Business Continuity & Resilience Specialist UNSW

DUSHYANT SATTIRAJU

JACQUI LOUSTAU

Cyber SecOps Team Lead Deakin University

Founder AWSN

JANE FRANKLAND

TAMARA MARTIN

Owner & CEO Knewstart (UK)

Security Resilience AGL

RACHELL DE LUCA

NIGEL PHAIR

Global Security Leader Aurecon

Director UNSW Canberra Cyber

RACHAEL LEIGHTON

REBECCA WINFIELD

Principle Advisor Cyber Strategy & Awareness Department of Premier and Cabinet (Vic)

Protective Security Operations & Delivery IAG

JAMES NG

DR MARIE BODEN

GM- Security Operations AARNet

Outreach Officer Research Interaction Design University of Queensland

CATHERINE BUHLER

GAI BRODTMANN

CISO Energy Australia

Futures Council Member National Security College

SAMANTHA MACLEOD Security Executive nbn Australia

LIDIA GIULIANO Information Security

ANDREW DELL

MICK DUNNE

CISO QBE Insurance

CISO-CSO AustralianSuper

DR MARIA MILOSAVLJEVIC CISO Services Australia

IAN YIP CEO Avertro


I can’t recommend this approach enough for any career path, if you ever get the opportunity. So how did I end up doing what I do in cybersecurity? I always had an interest in technology, more

Lauren Zink

specifically security, but I started out after college

Security Training and Awareness Program Manager at Oportun

opportunity turned up at a large corporation in my

in teaching. Then, an entry level security analyst hometown. The position embraced both my passions, so I took a punt and was lucky enough that someone

I

saw something in me and gave me a chance. Since then I have continued to learn, grow and develop my reckon I have one of the best jobs in cybersecurity: security awareness and

I’m now in a completely different field from the one

engagement manager. I have the privilege of

I started in, partly by chance and partly from choice.

developing, expanding and maintaining security

However, I wouldn’t have it any other way. The path I

awareness programs that are fun, engaging

took has taught me many lessons that I am incredibly

and designed to educate employees in various

thankful for. Security is a really exciting field to be

security practices, policies and controls. The most rewarding aspect of managing a security

in. That’s the way it’s been from day one, and I don’t expect things to change.

awareness program is seeing the impact different

I got into security awareness when the role barely

awareness initiatives have on people’s personal lives.

existed, when you couldn’t find what the job entailed

The training I provide is meant to be carried over into

just by doing an internet search, and when few people

our employees’ home lives to help protect them, their

understood just how important security awareness

friends and their families. It’s very rewarding to hear

was to the overall success of a security program.

real stories from people I have worked with regarding how they took what they learned from our security awareness program and implemented practices to prevent someone from becoming a victim of a reallife scam.

42

skills, which has helped me advance my career.

Sometimes it was difficult to get my ideas taken as seriously as some bright and shiny new technology, but that simply incentivised me to get better at selling what I did and articulating its significance. However, I do believe there has been a shift to people

Another great feature of my job is that no two days

and companies understanding the importance of

are ever the same. Each day is a mix of training,

security awareness and to organisations having at

education and communications that take place all

least one individual, if not a team, fully dedicated to

while working cross-functionally with a wide array of

security awareness programs for the betterment of

people across my organisation.

the business.

I’m kept on my toes because there is always

However, my progress was not achieved without

something new to create awareness around, or a

tears and even bouts of uncertainty, which still occur

different approach to delivering content. The best way

from time to time. But I learned that my confidence

to truly understand the day-to-day nature of a job like

should not come solely from the validation and praise

mine would be to job shadow someone for a week.

of others. I finally realised that the more I could do to

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

learn and advance regardless of who was watching,

We, as an industry, need to continue to lift and

the better I would be, for others and for myself. Once I

promote awareness and develop a strong pipeline

understood that I started to find my voice and realised

that will fill open positions in the field. So, if security

what I had to share was valuable, people wanted to

awareness training appeals but you don’t understand

hear me and my ideas.

it, reach out to people, build your network and ask

One thing I wish I had done earlier in my career is to have sought out a one-on-one mentor, and that

questions. Most people in the field are ready and willing to help, because they are excited about what

is something I probably still need to do. I have always been a mentor to others, but never had one I could learn and seek guidance from, and I do think that is very instrumental to success in any career. I’ve always been hungry to learn more and I’ve always put myself out there to participate, to speak and to share my knowledge. Saying yes when I was scared was difficult at first, but it has given me some amazing

“I reckon I have one of the best jobs in cybersecurity: security awareness and engagement manager. I have the privilege of developing, expanding and maintaining security awareness programs that are fun, engaging and designed to educate employees in various security practices, policies and controls.”

opportunities that have helped me grow in my career and made me a better person. Along the way I’ve learnt a lot from others. They, and a good network I work constantly to expand, have been critical to my career. I’ve met a few great leaders along the way who gave me brutally honest and constructive feedback, which some people may have found hard to hear. It was the best thing they could have done for me, because what they said was what I needed to hear to improve my programs and take them to the next level, and to better myself. While I’ve come a long way and so has acceptance of this role in the field, we still need more people in security awareness positions. I’ve talked to many K-12 students, college students and even those new to the security field who were unaware that a position

they do and eager to see the field grow. Also, we need more women in the security awareness business and in security in general because there is an acknowledged gender disparity. I think many who might consider a role may find the prospect intimidating because of the lack of women, but if they see and hear the voices of women similar to themselves who are thriving and ecstatic about their work, more and more will join. www.linkedin.com/in/laurenazink/ www.linkedin.com/learning/instructors/laurenzink?u=2125562 twitter.com/LaurenZinOH

creating awareness for employees and providing training in logical and physical security even existed.

WOMEN IN SECURITY MAGAZINE

43


With my interest in web development growing, I

Gabrielle Botbol Offensive Security Consultant at Desjardins

enrolled for a bachelor’s degree in computer science and after graduating worked for a large international company as a software developer. For four years I developed applications, websites and chatbots, and participated in the development of several product prototypes.

A

It was then I became interested in cybersecurity, and I created an open learning program to approach cybersecurity in a holistic way, based on technical s a girl I thought my career choices

subjects and subjects related to digital humanities.

were limited. At school, despite being

The experience inspired me to become a pentester.

very attracted to science, I pursued a literary education because various barriers prevented me from gaining a scientific education.

Before getting into cybersecurity, I was a receptionist in a luxury hotel in Paris, and an actress. My receptionist role taught me how to anticipate the needs of customers, and I still use my acting skills for physical intrusion mandates (sometimes customers hire pentest companies to test if their building is safe

Pentesting is the process of attempting to break into a system to check its safety. It aims to find vulnerabilities so they can be patched. There are different phases in a pentest: planning, discovery, attack, and reporting. When we test, we do not go straight to the attack phase. We plan the test program with the customer, define the scope — the items the customer wishes to test — and take care of the legal matters.

and if someone could break in easily and access

Then, it is necessary to gather information about the

sensitive locations). Even then, in my spare time I

target; how it works, what technologies are used,

programmed websites about the theatre and about

etc. This is the discovery phase. The next step is the

art in general.

attack phase, where we test different attacks and take note of the technique and the results. Finally, in the reporting phase, we produce a report describing the

“My first employer hired me because they liked my blog and because I was able to show my skills through a CTF exercise during the interview.”

vulnerability and how it can be removed. The National Initiative for Cybersecurity Education (NICE) Workforce Framework provides a taxonomy and common lexicon that describes cybersecurity work and workers irrespective of where or for whom the work

is performed. It provides a good description of pentesting and other cybersecurity roles.

44

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

employers are looking for, and to view any interview However, pentesting is still an immature discipline and in job postings employers ask for a wide range of skills. This can be confusing for applicants. To help people wanting to break into the field, a few months ago I looked at many pentesting job advertisements from several countries to identify the skills and knowledge required. I checked more than 100 postings from The Netherlands, Germany, Canada, France, Australia, USA and Switzerland. Here are what I determined to be the most common requirements for a pentester position. • Security testing tools: scanners, proxies, fuzzers. • Certifications: OSCP, OSWP, GPEN, GWAPT, OSCE, OSEE, GXPEN. • Soft skills: sense of commitment, self-reliance, teamwork, perseverance, curiosity, lifelong learning, ability to explain and simplify technical concepts, critical thinking, communication, writing. • Technique: threat hunting, mobile testing, incident response, threat intelligence, reverse engineering, malware, ciphers, data obfuscation, social engineering, code review, IoT, architecture review, application threat modelling, forensics, vulnerability assessment, cloud security, scripting, crypto, python, NIST, MITRE attack, AWS, SAP, Azure, Windows OS, Linux OS, pentesting standards • Plus: bounty hunting, CTF, writing articles.

as a training exercise for the next one. People often ask me about certifications. In my opinion, certifications are not mandatory. Skills can be sharpened by working on capture-the-flag (CTF) platforms or participating in bug bounty programs. I understand certifications are an asset to any individual, and well-known certifications give job candidates credit with prospective employers, but they can be costly. They disadvantage both beginners and skilled people who do not deal well with the pressure of exams. I usually recommend those who can afford the fee and feel comfortable with doing so to obtain certifications, and suggest others demonstrate their expertise through blogs, articles, podcasts, CTF writeups, bug bounty reports or anything that shows their knowledge and skills. My first employer hired me because they liked my blog and because I was able to show my skills through a CTF exercise during the interview. Apart from the technical challenges of pentesting I enjoy the role because it helps to protect cyberspace and enables people to surf the net safely and securely. It’s a complex and never-ending task because cybercriminals are becoming more numerous every day, endangering individual liberties, democracy, economic stability and sovereignty. Such challenges make me proud to participate in helping society achieve cyberpeace.

In my opinion, job advertisers expect you to know everything and be multiskilled. But to get started you have to focus on one specialty. This is why I always advise newcomers to pentesting to apply for many jobs, whatever the level of experience required, to better understand what

www.linkedin.com/in/gabriellebotbol/ twitter.com/Gabrielle_BGB

gabrielleb.fr/blog/

gabrielleb.fr/blog/category/podcasts/

WOMEN IN SECURITY MAGAZINE

45


I work very hard to improve my team’s performance by instilling scrum values and principles and ensuring they follow the fundamentals of openness, honesty,

Winifred Obinna Scrum Master at Blue Cross and Blue Shield

and respect in their work. I’ve led and coached eight scrum teams developing software products and automated tools for long-term care pharmacy services. I deliver course-correction with respect,

I

straightforwardness and encouragement, and offer a trusting and productive medium to grow confident and exceptional workgroups who provide high-quality ’m a scrum master at Blue Cross and Blue Shield of Illinois, Montana, New Mexico, Oklahoma and Texas, part of a federation of 36 US health insurance companies that provides health insurance to more than 106 million people. I also freelance as an executive consultant identifying

and mitigating cybersecurity risks and vulnerabilities. As a scrum master I manage the implementation of the scrum framework, an agile framework to develop, deliver and sustain complex software products. I’m also responsible for coaching others and for managing and maximising the productivity of the scrum team, keeping them focussed on the end result. We undertake high visibility projects, taking them from ideation to implementation on time and within the allotted budget. My daily responsibilities include: • Creating an environment where my teams can thrive and be effective; • Ensuring good communications and relations between teams and product owners; • Tackling and improving team dynamics; • Protecting teams from disruptions and distractions; • Clearing obstacles that impede productivity.

products, services, and processes. Through change management and continuous improvement initiatives, I have been able to increase scrum team productivity by 15 percent and deliverables quality by 30 percent. This resulted in us delivering a $US2 million plus software rollout with zero defects, on-time and under budget, which immediately doubled RoI. Scrum helps generate great value through adaptive solutions, and organisations incorporate the scrum framework in specialty areas, like cybersecurity, to solve complex problems. So, scrum master skills are transferable into other, specialty, areas of IT, including cybersecurity management. When I realised my scrum master skills were transferable I pivoted into cybersecurity, brought my experience and skillset to a new landscape, and took on complex cybersecurity challenges. Cybersecurity is a growing field; there is high demand for skilled people and my skill set was, and still is, in high demand. Understanding the foundation of scrum was essential to me when I was studying to become a scrum master and I wanted to challenge myself, see what I could pursue after I gained my scrum master certification from SCRUMstudy, the accreditation

46

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

body for scrum and agile. This built on my earlier

It has helped guide me through much of my

Project Management Professional (PMP) certification

cybersecurity career.

from the Project Management Institute.

And it is a career I would urge more women to

As a scrum master, it is my job to clear obstacles

choose. We need more people to address the skills

for my teams, but I’ve also faced a few of my own

shortage, but especially we need more women, to be

roadblocks on my journey to get where I am today.

heard and to discredit toxic masculinity in this male-

I have had to keep abreast of the latest and most

dominated industry.

relevant skills, technologies and practices in my discipline. I have had to strive for excellence, practice immense patience, and learn from my mistakes. This has not always been easy.

Women can bring new perspectives and new solutions to replace the tired old perspectives that have been around for decades, and not only

I started out with a degree in psychology and followed that with an MBA in management. Then I had earlier stint with Blue Cross and Blue Shield where I progressed from project coordinator to project manager, honing my skills and building a reputation as an exceptional communicator, relationship builder and strategic leader of high-performing teams.

“When I realised my scrum master skills were transferable I pivoted into cybersecurity, brought my experience and skillset to a new landscape, and took on complex cybersecurity challenges. Cybersecurity is a growing field; there is high demand for skilled people and my skill set was, and still is, in high demand.”

I’ve been helped along my journey by some great mentors and coaches. Most recently, as I pivoted into cybersecurity, I found guidance through completing an eight week Gateway to Cybersecurity accelerator program, run by cybersecurity maven and

in cybersecurity. All businesses need more skilled women who have business knowledge, management skills and technical knowledge.

success strategist Courtney H Jackson. It helped me

There is a serious lack of women in STEM fields, and

gain relevant, hands-on real-world experience.

this is not due to any lack of interest, rather it is due to

Another major source of guidance has been my acceptance into the Empower(H)er Cybersecurity Institute—a non-profit organization focused on providing a safe space for women of colour interested

a lack of validation. Girls today need to be validated. They need to see women thrive in business and industry so they can be inspired to carve out similar futures for themselves.

in or working in cybersecurity—for a program called

To anyone considering a career in cybersecurity, or

Elevate U. It is run in partnership with Cybrary, a

becoming a scrum master, my advice is to be strong,

community of people, companies providing open

straightforward and hopeful. Be open to challenges

source cybersecurity educations.

and face them head-on. Show honesty, integrity and

The Elevate U program offers one-on-one mentorship, a clearly defined career path and a program structure tailored to participants’ desired career outcomes.

respect in your work, whatever it may be. www.linkedin.com/in/winifred-obinna

WOMEN IN SECURITY MAGAZINE

47


CHAMPIONING A CYBER-SAFE WORLD Ankita Dhakar Managing Director, Security Lit Ltd.

A

fearless young leader determined to

is this passion that makes her such an inspirational

help make the digital world a safer

leader.

place. That is Ankita Dhakar, founder and heart and soul of New Zealandbased cybersecurity company, Security Lit.

decisions. Her kind-hearted and friendly nature also inspired Jozsef Gacsal, former managing director of Fujitsu Hungary, to join her team as CTO. He has

She has neither a formal background nor a degree

previously held senior roles in Europe with Intel,

in digital security. She learnt about cybersecurity

Microsoft and IBM.

incidents and the very real threats businesses and individuals face in the digital era while working for an information security company, and knew she had to help.

Ankita believes in herself and in her team, which is how she achieves her goals for Security Lit. Ankita is an honest and genuinely caring person. She inspires everyone she works with, but especially women. She

In the short time since founding Security Lit in

shows other women they can achieve their goals by

February 2020, Ankita has built a strong team and

believing in their vision, trusting their team, and giving

acquired noteworthy key clients. But she’s not resting

back to the community.

on her laurels.

48

She puts her team first and involves them in

She founded Security Lit on the values of

Her vision is to take Security Lit global — she

commitment, integrity and collaboration, and

already has offices in India and Hungary — and

she lives those values every day. Her energy and

to keep educating businesses and individuals

commitment motivate the team when things get a

about cybersecurity threats and ways to protect

bit messy. Ankita has exceptional leadership qualities

themselves. Ankita came into the industry with a

and decision-making skills. She values her clients’

genuine wish to protect people against cybercrime. It

time and respects the trust they put in her.

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

For example, one client was not entirely happy with

through people like Ankita. There is a real shortage of

its experience of Security Lit so Ankita stepped in

professionals in this field in New Zealand and women

and listened to understand where the problem was.

are still underrepresented.

She made changes based on the client’s experience because she is determined to continually evolve and improve.

She has built a cybersecurity company without having a technical background or formal cybersecurity education. She has lived in New Zealand for only

Ankita sees no sense in dwelling on the past and

five years and has a plan and vision to create an

instead is always looking ahead. She is a real optimist

environment where businesses and individuals have

and moves quickly once she has made a decision. Her

no need to worry about their digital assets.

primary focus is solving problems and empowering the people involved in a problem and its solution. She leads by positive example but also creates opportunities for others to rise. And because she is a people person, she always considers the impact of significant decisions on people and their situations. With the right publicity, Ankita’s story can inspire

She moved to Hamilton soon after incorporating Security Lit because she wanted to help the graduates of the University of Waikato by training them, giving them real-world experience that would enable them to find employment quickly, and inspiring them to help protect New Zealanders and SMEs from continuously evolving and increasing cyber threats.

young women to get into cybersecurity. It is a rapidly growing field that many do not see as presenting a career opportunity, but could be inspired to do so

www.linkedin.com/company/securitylit www.securitylit.com

WOMEN IN SECURITY MAGAZINE

49


KAREN STEPHENS Karen is CEO and co-founder of BCyber, an agile innovative group who works with SMEs to protect and grow their business by addressing their cybersecurity and governance risk gaps by demystifying the technical.

C O L U M N

APRA CPS 234: What you need to know Australian Prudential Regulation Authority (APRA)

HOW DO I COMPLY?

Prudential Standard CPS 234 Information Security

The actions you undertake depend on your

(CPS 234) is a mandatory regulation outlining cybersecurity requirements imposed on all APRAregulated entities. It came into force in July 2019, but here is the kicker: from 1 July 2020, third parties handling APRA-regulated entities’ information assets must follow CPS 234 requirements and, when requested, attest to the security controls they have established. This means vendors and channel partners of APRA-regulated entities will have to comply with CPS 234. Here is some food for thought:

WHAT ARE APRA-REGULATED ENTITIES? Banks, credit unions, authorised deposit-taking institutions, super funds, life insurance companies, friendly societies, general insurers, and private health insurers, etc.

WHAT IS THE AIM OF CPS 234? To make APRA-regulated entities identify and harden

interpretation. There is no checklist!

FUN FACT Starting this year, it is expected that APRA will be requesting one-off tripartite independent cybersecurity reviews. External audit firms will be reviewing CPS 234 compliance and reporting back to APRA. You may find yourself answering audit questions and having to provide evidence. So be ready.

BOTTOM LINE The responsibility for maintaining information security sits with each APRA-regulated entity’s board, but cybersecurity staff will need to be ready to act so boards can meet their obligations when APRA’s auditors request information and evidence. The process will be very similar to providing a SOC2 report.

their information security measures. It puts strong cybersecurity measures front and centre. Think of it as a refocus on better cybersecurity, which is no bad thing considering the Sensitive and / or Personally Identifiable Information these entities hold.

WHY HAVE CPS 234?

www.linkedin.com/in/karen-stephens-bcyber/ www.bcyber.com.au

It’s trying to minimise the likelihood and impact of information security incidents on the confidentiality,

karen@bcyber.com.au

integrity or availability of APRA-regulated entities’ information, and on information assets managed by related parties or third parties.

50

WOMEN IN SECURITY MAGAZINE

twitter.com/bcyber2 youtube.bcyber.com.au/2mux


CAREER PERSPECTIVES


ATTRACTING WOMEN INTO CYBER TAKES MORE THAN EQUAL PAY by David Braue

It’s a good start, but there are other things that make cyber appealing

T

alk to a woman working in security,

expecting to be with my career” – compared to 20%

and you’re likely to hear a story of

of men.

enthusiasm and engagement for a career more varied and interesting than she may have originally expected. So: with companies

desperate for more security staff, why are they still struggling to find and attract more women into these roles? As usual, the answer is both simple and complex – and it depends on whom you ask.

Such figures suggest that – when they can be brought into the industry – women are both more likely to stay as productive members of the team, and more likely to stay for longer in a job where they feel they are getting what they expected from the position. Yet just because women in security are more positive about their roles than their male counterparts, doesn’t mean there aren’t still glaring problems:

By the numbers, women are more engaged in

22% of women told (ISC)2 that they had experienced

cybersecurity careers than ever: the latest (ISC)2

discrimination in their career – compared with 13%

Cybersecurity Workforce Study of 3237 global

of men.

security professionals, for one, found that women in cybersecurity “view cybersecurity as a viable, rewarding career and a solid majority [68%] of them plan to stay in the profession until retirement”. Interestingly, fully 53% of the women responding to that study said they started their careers in cybersecurity – compared with 38% of men.

Women were also less likely to report that they had enjoyed career milestones such as becoming a go-to specialist, becoming a go-to source of information for colleagues, building a strong professional network, and being assigned a leadership position. Yet the survey also unearthed a significant discrepancy in salaries, with women in cybersecurity

Women were also more likely to say they “have a

being paid an average of $21,500 ($US16,500) less

good idea” of their career path, compared to 48% of

than their male counterparts – who are earning an

men. And 32% said they were “exactly where I was

average of $125,000 ($US96,500) in North America, and $87,500 ($US67,000) in Europe.

52

WOMEN IN SECURITY MAGAZINE


F E AT U R E

While this is a win for pay equity, findings that women are happier overall with their cybersecurity careers despite being paid less than men suggest that money alone won’t bring women into the industry. Indeed, Christie Struckman – a vice president within Gartner’s Leadership, Culture and People team – offers nine strategies for building the pipeline of women candidates other than ensuring genderneutral payment. Creating better job descriptions is one way of making sure women aren’t put off of a role before they even come through the door (pro tip: feed copy through the Gender Decoder to identify potentially dissuasive Fewer women than men reported a range of career achievements. Source: (ISC)

gendered language).

MORE THAN JUST MONEY

tend to have technical degrees, Struckman told

(ISC)2 offers an obvious conclusion from this data:

Gartner’s recent APAC Security & Risk Management

“while the overall trend is positive, some issues still

Noting that less than half of women in her audiences

Summit 2021, companies should expand their criteria

need to be addressed,” the report’s authors note.

to include other roles, degrees, and professionals:

“Women in the field face more discrimination and

degrees we really think people need in order to be

receive lower compensation than men. If these inequities are corrected, the cybersecurity profession

“we all just need to take a reset,” she said, “on what successful in your particular organisation.”

may attract more women.”

Yet, pressured by the need to tick governance boxes

A simple fix, right? Of course not.

said, many companies are still filling job descriptions

or meet customers’ specific requirements, Stuckman

After Secure Code Warrior recently hired male and

with esoteric technical requirements that make them

female candidates for roles that were basically

come across “like a contract – which is not a very

the same – but paid the male employee 10%

attractive way to represent your company.”

more – senior vice president of customer success

Use a “marketing lens” to make job descriptions more

and operations Fatemah Beydoun started asking questions.

appealing, she added, advising hiring managers to consider “what are we doing to talk about the great

The issue was not some conspiracy to pay the

work that we do and how it really makes a difference

female candidate less; rather, the male candidate had

to our organisation?’ Think about selling the job to

negotiated his salary package upwards while female

your prospective clients, versus making them feel like

was happy with what she was offered.

this is going to be the beginning of a contract.”

“I know from the research I have done on diversity

Other recommended strategies include offering

that males tend to negotiate a lot more and it’s harder

options for work flexibility – particularly relevant as

for a female to have those negotiation conversations,”

workplaces rebalance in the wake of the pandemic’s

Beydoun told a recent AustCyber panel session, “so

disruption – as well as recruiting internally across

I decided to raise it with the leadership team and we

the enterprise; targeting women’s universities and

had a long discussion about the best thing to do.”

colleges for direct recruitment efforts; promoting an

“The decision was made that if they’re both the same role, and have the same background, then the right thing was to go back and rectify that,” she said. “The

employee referral plan; gender-blind hiring practices; and enhancing corporate branding to reinforce perception of being a female-friendly workplace.

salaries should really align – and we’re making sure that we set the standard going forward with that.”

WOMEN IN SECURITY MAGAZINE

53


STRATEGIES TO BUILD THE PIPELINE

THE MISSING LINK

1. Create better job descriptions

Yet actively building the pipeline is only part of

2. Ensure gender-neutral payment 3. Offer work flexibility options 4. Expand your criteria – other roles, degrees, professionals 5. Recruit internally across the enterprise 6. Recruit from women’s universities and colleges 7. Reach students during college via internships 8. Promote employee referral plan 9. Gender-blind hiring practices 10. Enhance corporate branding as a female-friendly workplace Source: Gartner

the challenge: many of the things that may attract women to cyber, or to a particular company, are less intentional factors that can’t be rapidly pushed out with a strategy. “For me personally, it’s about role modelling,” Nichols says, noting the high-level participation of female cybersecurity executives like PwC trust and risk business leader Corrine Best, who is one of three women sitting on the federal government’s cybersecurity Industry Advisory Committee. “Being able to show that pathway is really important,” Nichols adds, “and it’s wonderful to get that visibility to showcase women in these really senior cyber roles.” Companies may need to improve their representation of role models but the industry has its own challenge, notes Dr Taniya Mishra, founder and CEO of AI

54

WOMEN IN SECURITY MAGAZINE


F E AT U R E

“I wouldn’t say I’m a traditional women’s rights activist by choice,” she adds, “but as I have a cyber security role in the industry, it kind of makes me one automatically – and this is due to the lack of strong female leadership.” Things are getting better, she says, noting that she has “definitely seen a shift” in recent years, with more engagement stemming from “increasing awareness within our workforce and expanding and creating mentoring opportunities – and forging womenoriented communities.” startup SureStart, pointed out during a CES 2021

Ultimately, that sense of belonging to a community

panel session examining similar issues in the fast-

can make all the difference in flagging cybersecurity

moving AI industry.

career opportunities for the next generation of women

After 12 years in the industry and years as a

in security.

graduate student before that, Mishra said, “it has

Sometimes, the difference between attracting a

been disheartening” to watch the persistent under-

woman to cyber and losing her can be a fine line.

representation of women, for example through the composition of industry panels.

After participating in a girls-in-STEM workshop at a major bank, 16-year-old student Tamara Baker – a

“The lack of representational role models is a huge

Code Like a Girl Ambassador and AWSN Women in

problem,” she said, “because you cannot be what you

Security award recipient – recalls the thing that made

cannot see. And so the next generation of AI builders,

her realise she could have a future in security.

technologists, and change makers – are they seeing themselves represented? Unfortunately, right now, they’re not.”

One of the workshop leaders “saw how much passion I had,” she told a Cyber Week 2020 panel after attending the previous year’s “enormous” event, “and

Mentorship programs may be explicit, or mentorship

she pulled me aside out of 50 girls in the workshop

may evolve as part of the everyday function of

to say ‘we would like to specifically offer you work

working in cyber.

experience’.”

This was the experience of Atlassian senior security

“I just remember literally crying on my way home,” she

trust analyst Jodie Vlassis, a “de facto mentor” who,

said. “I almost got run over by a tram – because I’m

thanks to the easier connectivity afforded by COVID-

this tiny, to them, girl and someone saw how much I

era remote working, has been increasingly advising

cared, and how much I wanted to go far.”

young women around the world “on how to make it in an industry where, unfortunately, women are still largely marginalised.”

“It was a really humbling experience – but it also showed me that the work you put into it can really pay off.”

WOMEN IN SECURITY MAGAZINE

55


DO YOU WANT YOUR VOICE TO BE HEARD?

Contact us today to find out how you can become an industry contributor, no matter the level of experience.

REACH OUT NOW 56

WOMEN IN SECURITY MAGAZINE


MEGHAN JACQUOT

REFINING MY FOUNDATION: CAREER TRANSITION TO CYBERSECURITY by Meghan Jacquot, Cybersecurity Specialist | Google IT Support Professional Curiosity is a murderous word...it kills cats (note that

But we all have limited time, so to become the human

I am not advocating killing cats). It is an adventurous

you want to be it is imperative to ask yourself these

word. It is a word of beginnings, and it is a word

questions:

that describes me and my childhood. My nickname growing up was Curious George, the main character in a series of popular children’s books with the same name, because I was always asking questions and starting experiments. I tinkered, built, and wanted to understand how things worked. But I did not go on to study computer science. Which is why, after teaching for 12 years, I found myself pivoting to a second career in security. I want to be tinkering and working on novel experiments as well as solving the problems of the future. Security is awash with jargon and acronyms. RMF is one of many. Traditionally RMF stands for risk management framework, and with any pivot there exists risk. So I took a risk when I decided to refine my foundation and embark on a career transition to security. Refining is an iterative process. In the case of a career transition it manifests as constant modification and adjustment of goals.

1. What do you like to do? What do you spend your time learning? 2. What are your skills now? What are you highly skilled at? These can be soft skills with a high emotional or intelligence quotient, and technical skills. 3. Are there any intersections between number one and number two above? 4. What are your professional end goals? 5. What steps are you currently taking to refine your foundation to get to your end goals? 6. What are some gaps between where you are now and where you want to be? 7. How will you fill in those gaps? Try to be strategic and realistic with this planning - think SMART goals. 8. Celebrate - you are one step closer to getting to your end goals! You are refining your foundation!

I embrace a growth mindset. I believe we can learn

I’m glad that you’re on your path and refining your

anything. As the poet Cleo Wade said: “I think we’re

foundation. I’m happy to connect, cheer you on, and

always becoming the woman we want to be.”

start a conversation. www.linkedin.com/in/meghan-jacquot-carpe-diem

WOMEN IN SECURITY MAGAZINE

57


EMILY EDGELEY

GRAB THE MIKE, IT’S YOUR TURN by Emily Edgeley, Public Speaking Coach for the Tech industry

An email arrives in your inbox. It’s a request to speak

me, becoming a speaker and having everybody’s eyes

at an upcoming security conference. What’s your

on me was out of the question.

immediate reaction? Is it one of butterflies in the stomach and of dread?

(mostly men) take the limelight. I let that voice in my

Or is it one of excitement? Do you shy away from the

head take over, and I stayed silent.

invitation, or do you accept it without question?

Did I limit my career? Absolutely! Did it impact my

I know for me, it was one of dread. During my whole

personal brand? You betcha. Did it keep me playing

career in cybersecurity I had never spoken at an

small? Of course it did!

event or conference. I had a pure maths degree and a master’s degree in information security, along with more than ten years’ experience under my belt. However, I still did not consider myself an expert, nor did I think I had anything worth sharing with others. I loved going to conferences, but I did not see a place for me on the podium. Looking back, that seems to have been crazy. I now know I had a unique background and a unique perspective. I had experienced failures and gained learnings that had informed my own take on things. I had interesting observations, realisations and aha moments that I could have shared, that other people would have learnt something from. I just did not realise this at the time. I was also terrified of public speaking, so much so I even struggled to ask a question from the audience. So, for

58

This meant I stayed in the shadows. I let other people

WOMEN IN SECURITY MAGAZINE

You see, if you ask 10 men to speak at a conference, it’s likely nine of them will accept. However, if you ask 10 women to speak at a conference, you’re lucky if one will accept. There are many factors at play here, one being that women may have less time to commit to such a request. However, based on my own experience and that of my clients, one of the main factors is a lack of self-belief. It seems a lot of us don’t believe we have something worth sharing, or we simply don’t feel sufficiently confident to get up on stage and deliver our message. On my journey to becoming a public speaking coach, I learnt two really important lessons


C A R E E R

P E R S P E C T I V E S

YOUR UNIQUE PERSPECTIVE IS WHAT MATTERS You don’t have to be the most experienced person in the room to tell others something they don’t already know and will gain value from. You just need to solve a problem for them, or see a big issue from a different perspective.

LESS IS MORE WHEN IT COMES TO YOUR MESSAGE The more you pack into a talk, the less people will get out of it. So don’t worry if you don’t have a massive project or complex approach to share. A great talk is often about one very simple idea that is meaningful and that solves a problem for the audience. I wish I could go back, knowing what I know now, because I’d grab that mike and take on the challenge.

3. Who would be interested? E.g. What type of people would you like to help, or what

But I don’t want to stop here. I want to help shift the

organisations or events would you really like to

gender balance of public speakers dramatically in our

speak at? What type of support would you want

favour. Having given birth to a daughter just over a

for this?

year ago, I’m even more determined to help improve the number of women gracing our stages, because I

Now, I implore you to commit to one bold action that

don’t want my daughter to grow up doubting herself,

will get you closer to sharing your knowledge. Maybe

or what she has to say.

it’s identifying the right event to speak at. Maybe it’s

We need more women on stage. We need the diversity of thought. We need to be represented. If you’re with me, let’s make this happen. We all have interesting stories. You can help people overcome obstacles you’ve already surmounted, and prevent them from making the same mistakes. You can use your learnings, or your failures, to shape a great talk that people will thank you for. If you’ve never spoken at an event or conference and find the prospect daunting, I want you to set aside 15 minutes to answer these three questions. 1. What makes you unique? E.g. what’s your background? What diverse experience do you have? What perspectives do you have that others don’t?

figuring out in detail what you’d talk about. Maybe it’s honing your storytelling skills. Whatever it is, note down the action, the date and why it’s important to you. If you’re already speaking on stage, reach out to someone who isn’t and offer them your guidance and support to do the same. So, when the next generation grows up and starts entering the workforce, what they’ll see when they go to events and conferences will be very different, because of you. Wouldn’t that be an awesome story to tell? www.linkedin.com/in/emily-edgeley/ www.instagram.com/emily_edgeley/

2. What could you talk about? E.g. What are you really passionate about, what aha moments have you had, or experiences / big learnings / failures / insights that others might find really interesting

www.emilyedgeley.com/ twitter.com/Emily_Edgeley

and useful?

WOMEN IN SECURITY MAGAZINE

59


JESSICA TIEU

BREARNA LEOPOLD

WHY MORE WOMEN IN CYBERSECURITY WILL ULTIMATELY MAKE US SAFER Interview with CrowdStrike’s Jessica Tieu, Senior Director of Legal, Asia Pacific & Japan, and Brearna Leopold, Inside Channel Account Manager, Australia & New Zealand WHAT IS YOUR ROLE AT CROWDSTRIKE AND DESCRIBE YOUR CAREER JOURNEY SO FAR?

you combine this with laws that are constantly in

Jessica: I am the Senior Director of Legal for

Brearna: I started at CrowdStrike during my third

CrowdStrike Asia Pacific and Japan and have worked

year of university as a sales development intern. I

in the IT industry for over 23 years. After completing

was then offered an opportunity to take on a unique,

a double degree in law and business, I joined

permanent part-time position as a sales development

Accenture as an IT analyst and then moved to their

representative while I completed my final year of

legal department. I really enjoyed being an in-house

studies. After graduating I moved into a full-time

lawyer because it enabled me to both learn about

role and became the sales development team lead.

the business and apply the law. From there I built my

This role exposed me to larger enterprises and their

legal career in the IT industry starting at Siebel, then

requirements for cybersecurity, and it was also where

Symantec, McAfee and now CrowdStrike.

I started developing my leadership skills. I have

At both McAfee and CrowdStrike I was the first legal

recently been promoted to inside channel account

person hired in the APJ region and helped to build and lead the APJ legal teams. As nerdy as it sounds, I find it interesting to learn about how we are helping to keep the world safe from cyber attackers. When

60

WOMEN IN SECURITY MAGAZINE

catch-up mode, it makes for a very dynamic work environment in which I am constantly learning.

manager, which involves working with our partners to strategise and drive new business initiatives.


C A R E E R

P E R S P E C T I V E S

CYBERSECURITY PROFESSIONALS ARE MOST LIKELY TO BE MALE, ACCORDING TO ISC’S WOMEN IN CYBERSECURITY REPORT, WITH GLOBAL FEMALE REPRESENTATION SITTING BETWEEN 23 AND 30 PERCENT. FROM YOUR EXPERIENCE, WHY DO YOU THINK THIS IS?

companies because it’s been proven to foster higher

Jessica: There is a lack of female interest in STEM-

experiences that each staff member can bring to the

based courses which, from the outset, means women

table.

employee engagement and increase profits, amongst other things. Brearna: Diverse individuals are needed to ensure success in any business, and cyber safety is no different. Women can bring unique points of view into conversations around cybersecurity. Businesses must take advantage of the variety of backgrounds and

are underrepresented in the sector. Too often this

meet close to 100 percent of the requirements listed,

CAN YOU OFFER INSIGHT INTO HOW FEMALE CYBER PROFESSIONALS CAN SUCCEED IN A TRADITIONALLY MALEDOMINATED FIELD?

whereas men are more willing to apply regardless.

Jessica: Don’t try to be “one of the boys”, instead

is attributed to a lack of female applicants for cyber positions. However, research has found that women tend to apply for roles only when they believe they

I’ve also heard from women working in the industry that job ads can sometimes use “aggressive” language which can deter people from applying. If companies truly want to hire more women they need to look at their recruiting practices to ensure they are not inadvertently discouraging female applicants, and women need to be more confident in applying for positions even when they don’t meet all the requirements. Brearna: Although positive changes are being made, there still seems to be a sense of a “Boys’ Club” in the industry. Young women may associate working in technology with beers, hackathons and office table tennis, activities typically skewed towards male preferences. As a result, there are significantly fewer female role models from which younger women can seek guidance and advice. I would encourage experienced women in the industry to speak openly about their journeys, and ensure that other women entering the industry have access to continued support.

WHAT DO YOU SEE AS THE KEY BENEFITS TO HAVING MORE WOMEN WORKING IN THIS INDUSTRY? Jessica: Women bring different skills and experiences to the positions they hold, which often means a variety of new ideas and solutions. This is invaluable at every level of a business because it generates greater collaboration, creativity and innovation.

leverage your strengths as a woman. In a maledominated environment, women can sometimes try to blend in by mirroring what their male colleagues are doing, without realising that one of their many strengths lies in the unique perspectives they can offer as women. Voice your opinions and ideas rather than simply taking the lead from others. Brearna: When you are the only female in the room it can be easy to fall into the mindset that you don’t belong or that you don’t have the experience to contribute real value. Be aware of imposter syndrome and try not to fall victim to it. This can be easier said than done. However, having the guts to speak up and volunteer for opportunities can only improve your confidence and learning. It will become easier each time you put your hand up!

WHAT’S YOUR ADVICE FOR WOMEN SEARCHING FOR A JOB IN CYBERSECURITY OR LOOKING TO ADVANCE THEIR CAREER? Jessica: Apply for any role that appeals to you, and don’t underestimate your skillset. There is a broad range of roles in cybersecurity and not all roles require advanced technical knowledge or skills. Don’t let the fact that it’s a male-dominated industry deter you. Instead, see that as an opportunity to challenge the norm and to bring a different set of skills to your chosen role.

Diversity is becoming an important focus for

WOMEN IN SECURITY MAGAZINE

61


Brearna: Take advantage of the interesting

Be courageous. Try something different, stand up for

opportunities presented to you and never

something you believe in, challenge the norm, voice

underestimate the power of networking. When

your ideas and opinions, and self-advocate.

applying for promotions and new roles, do your research and, if you are interested in a company, look them up on LinkedIn. Reach out to individuals who

BREARNA

currently work in the role you aspire to and invite

Don’t underestimate the power of a strong network.

them to coffee. Don’t be afraid to put yourself out there and ask for help. We all started somewhere. Above all, always make your goals and ambitions clear. Set your intentions for your career path and communicate these regularly to your mentors and managers.

Your network is valuable. Invest time in developing and maintaining relationships, because these will give you access to new perspectives, ideas and opportunities. Remember to give back. At some stage in your career, someone will have given their time to help

HAS THE PANDEMIC CREATED MORE OPPORTUNITIES FOR WOMEN IN CYBERSECURITY?

you. Acting as a mentor yourself will encourage self-

Jessica: The pandemic has certainly challenged the

Be an effective listener. Listening not only

idea that workers need to be physically in the office to be productive. Working from home has also offered the men in the industry the opportunity to gain greater appreciation of the challenges their female

reflection, help you see new perspectives, and give you an opportunity to practice leadership skills. demonstrates respect for your peers, it also gives you clarity and access to better information. In a world where knowledge is power, listening is an effective, yet simple, way to gain information.

colleagues face. This could go a long way towards getting men to better advocate for and support their female colleagues’ careers in the future. Brearna: COVID-19 has seen the workforce embrace

BREARNA LEOPOLD www.linkedin.com/in/brearna-leopold-21419a134/

a flexible way of working. In the past, women may have felt pressure to choose between time spent supporting their families and time spent developing their careers. Knowing I am likely to have access to

JESSICA TIEU www.linkedin.com/in/jessica-tieu-4386a43/

flexible working arrangements when I choose to start a family gives me the freedom to set both long and short term career goals.

FINALLY, WHAT ARE YOUR STRATEGIES FOR OTHERS TO SUCCEED IN A CYBERSECURITY CAREER?

CROWDSTRIKE www.linkedin.com/company/crowdstrike/ @crowdstrike www.facebook.com/CrowdStrike/

JESSICA

twitter.com/CrowdStrike

Be adaptable. It is a fast-paced and dynamic industry that is constantly evolving, so being able to adapt to change is important. Embrace being in the minority. The fact that there are few women in the industry can work to your advantage if you focus on the positives and the value you bring to the table.

62

WOMEN IN SECURITY MAGAZINE

www.youtube.com/channel/UCsRdY9CtEVWTNO4ulwfzqVA


A PROGRAM THAT CONNECTS, SUPPORTS AND INSPIRES FEMALEIDENTIFYING TERTIARY STUDENTS AND EARLY CAREER PROFESSIONALS.

"When women work together, they become a force to be reckoned with. Be part of a force for good in the security industry, by joining the AWSN Cadets program today!" - Liz B, Co-Founder

Studying or an Early Career Professional in information security? Learn more at awsn.org.au/initiatives/awsn-cadets/


SAI K. HONIG

CAMARADERIE by Sai K. Honig, CISSP, CCSP Co-founder - New Zealand Network for Women in Security Board Member – Black Cybersecurity Association

There have been many studies, articles and

the majority of housework is still done by women.)

talks about including women and minorities in

Women need a space to “belong” and share their

cybersecurity. Some have canvassed introducing

thoughts. During this pandemic, with its various

policies to promote inclusivity, such as flexible work

lockdowns and other social gathering restrictions,

hours, parental leave, remote working, unspoken

this need to “belong” has been even greater.

bias training, etc. Others have called for changes to the hiring process to make it more open to people with diverse backgrounds and talents. A majority of these proposals are well thought out. Businesses that espouse them may see greater diversity in their workforces. Being a woman and from an ethnic minority, I feel that there is one thing that well-meaning policies cannot implement – camaraderie. The Oxford English dictionary defines camaraderie as “mutual trust and friendship among people who spend a lot of time together”, but it’s a term perhaps more often associated with men, “the old boys club” or “mates”. Camaraderie is also necessary for women. They too need to be part of something outside of work, school, childcare, dependent care and housework. (Yes,

64

WOMEN IN SECURITY MAGAZINE

Those of us in fulltime employment spend the majority of our week working, and a great deal of time with our coworkers. Even though we may be working remotely, we are still online with work colleagues. There is an expectation of “mutual trust”. We expect everyone to do their jobs to the best of their abilities. After all, that is why they were hired. Friendship is another thing. It is defined as “the emotions or conduct of friends; the state of being friends”. This state can be based on a number of things, such as a common interest or background. It is organic and can develop over time. It is not something that organisations can foster or manage. That is why organisations like the Australian Women in Security Network (AWSN) are so important. AWSN is “an open network of people aiming to grow the


C A R E E R

P E R S P E C T I V E S

on a number of projects with other like-minded organisations and with allies. Through BCA I have been able to develop meaningful relationships. These colleagues from around the world learn of my challenges, and I of theirs. We offer mutual advice, support and mentorship. In the short time I have been with BCA, I have developed the camaraderie I was missing. This camaraderie extends beyond cybersecurity. One member reached out after learning that New Zealand was back in limited lockdown. Shortly after it was reported that there had been large earthquakes off the coast of New Zealand members reached out to see if I was alright. I have checked in with members to see how their families are doing. (We even refer to each other as “fam”.) And it’s good

“Women need a space to “belong” and share their thoughts. During this pandemic, with its various lockdowns and other social gathering restrictions, this need to “belong” has been even greater.”

to wake up each morning to “Good Morning” messages and uplifting words. So, how can businesses support this type of camaraderie? By making space for these organisations. They could offer space to enable staff to meet in person, or provide them time during the day to attend virtual

number of women in the security community”. There is a sister organisation across the Tasman, New

sessions. Support could simply be allowing a

Zealand Network for Women in Security (NZNWS)

member to use internal communications channels

which is “about bringing women in security together”.

to announce any achievements made through these

These organisations foster friendships among

organisations.

women. Through them I have had the privilege of

Camaraderie is developed by individuals with other

getting to know a number of women who are doing amazing things in cybersecurity, and giving back to their profession.

individuals. It is not something that can be created by an organisation. Businesses should accept this and allow camaraderie to develop during the normal

For the past six months I have also been part of a new

course of work, not just at the office party or after

organisation, Black Cybersecurity Association (BCA).

work drinks.

This is an organisation of volunteers whose mission is to inspire, engage and empower African Americans to reach their full potential, to become leaders, and to positively impact their communities. In less than one year it has grown to more than 2,000 members from around the world. Programs to learn new skills and gain real world experience are in place. We have mentorships for students and those transitioning into

www.linkedin.com/in/saihonig/ NZNWS www.newzealandnetworkforwomeninsecurity.wordpress.com BCA www.blackcybersecurityassociation.org

cybersecurity from other professions. We partner

WOMEN IN SECURITY MAGAZINE

65


Cyber Security

# TO PWOM ENI NS ECURITYASE AN WO MENINSECURI TYASEANRE G ION . COM

NOMINATIONS CLOSE 30 MAY 2021

T

his initiative has been established to recognize women who have advanced the security industry within the ten countries of the Association of Southeast Asia Nations (ASEAN). Nominations were scheduled to open on Monday March 8, 2021, coordinating with International Women’s Day. The Top Women in Security ASEAN awards follow similar initiatives in India, as well as Africa, Europe and Canada and form part of a global campaign by the Women in Security & Resilience Alliance (WISECRA). This initiative is open to all ASEAN countries following very successful Top Women in Security Awards held during 2020 in Singapore, Malaysia and Philippines.

O RGA N I S ERS

ME D I A PA RT NE R S

We have gathered unique industry partnership arrangements, bringing together key chapters of premier, global security industry associations and professional women in security groups in Singapore. Malaysia, Indonesia, Philippines, Thailand and including the ASEAN Region Women in Security Network. We thank them for their support. Nominations close 30 May, 2021. The awards will take place in July 2021. Please nominate at your earliest opportunity.

NOMINATE HERE

SU PPO RT I N G PA RT N E R S & ASSO C I AT I O N S

ASEAN REGION

WOMEN IN SECURITY NETWORK


F E AT U R E

RECRUITERS PICK THE CYBER SKILLS HOTSPOTS by Stuart Corner

T

here was plenty of good advice for

equally important as the technical yet can be harder

aspiring and current cybersecurity

to develop.

professionals from a panel of four Cyber Security specialist recruiters at #Choose to Challenge, an online conference organised jointly by

ISACA’s Sydney and Melbourne Chapters and the Australian Women in Security Network (AWSN), held on March 9, for International Women’s Day.

Ben Sawyer, Senior Associate, Cyber Security and Risk at u&u. Recruitment Partners summed up the situation, saying: “I’ve got one customer who is a director for cyber in the public sector. She’s struggling so much to find the right resources that she’s decided to identify people who have got really good soft skills, show some technical aptitude and some passion for

The theme of the session was In-Demand Skills &

cybersecurity and information security, and move

Career Pathways. And from panellists’ comments

them, if they’re willing and enthusiastic, into more

it was clear that the in-demand skills extend well

cyber and risk roles. I think is going to be a strategy

beyond the technical aspects of cybersecurity and/or

we will see more and more of in the future to try and

IT skills.

combat what is just simply a skill shortage.”

In part, this is due to the substantial shortage of experienced cybersecurity professionals. Employers now realise they need to identify key soft skills in candidates, for example critical thinking, communication and a passion for security - are

CYBER NEEDS LAWYERS He also identified opportunities in cybersecurity for people with a legal background. “I think anyone with a law degree will do well for some of the roles

WOMEN IN SECURITY MAGAZINE

67


“There is a genuine need for security awareness professionals to bridge the gap between Business and Technology and tell the story right from both sides. Security Awareness could be a great area for nontechnical professionals to break into Cybersecurity.”

we’re seeing now. It’s not enough to be good in the

is about protecting the business and it’s people. So if

governance risk and compliance space. A legal

you understand the business needs you can add value

background is going to be really helpful.”

and upskill yourself on the technical side of security.

“Privacy is going to be a key areas. So for any lawyers that want to move into cybersecurity, that area is primed for the taking.” Kate Broughton, Head of Delivery at the Decipher Bureau agreed, stating she has seen an increase in requirements for people with a legal background. “We have had a significant rise in Privacy roles across our business and our clients are looking for hires that can bring their legal expertise to privacy engagements”.

COMMUNICATION SKILLS & PASSION Riki Blok, Principal Consultant, Cyber Security at Talenza, said: “It doesn’t matter what your job is, even if you’re a penetration tester, everybody needs to write a report at some point. Everybody needs to be business-facing. So you can’t just fall back on [technical competencies] anymore.” Palak Trivedi, Sr Principal Consultant-Technology with Capstone Recruitment, stressed the importance of cybersecurity professionals having industry knowledge and good communication skills. “Security

You can talk the language that business stakeholders understand and influence early adoption.” Broughton mentioned a significant increase since the beginning of COVID in the number of security operations roles. “of course there needs to be a technical aptitude, but [the interviews] were definitely more around the passion and the communication skills. At a senior level you need to clearly articulate the how and why of your role. At the entry level, you need to demonstrate what you have done through your university training, or other courses, to show that you’ve got critical thinking and analysis skills. Blok reflected on the need to make sure that you also articulate the extra steps that you have taken to increase your knowledge and to demonstrate your “passion”. Make sure to talk about “the extra bits and pieces you’ve been involved with – they are the bits that make sure you stand out from the crowd” in your CV. While all were in agreement there is a shortage of experienced cybersecurity people across the board, other identified areas included: cybersecurity awareness, and governance risk and compliance (GRC).

68

WOMEN IN SECURITY MAGAZINE


F E AT U R E

Sawyer tipped GRC to be one of the most in-demand

the message across in the security education and

skills over the next few years. “There are not going to

awareness space.”

be enough people in a few years’ time with the way the banking regulations are going.

Palak said “there is a genuine need for security awareness professionals to bridge the gap between

“Now you’ve got separate cyber boards in financial

Business and Technology and tell the story right from

services firms. What I’m hearing from CISOs is that

both sides.” She also added that security awareness

they don’t know what they are going to do when

could be a great area for non-technical professionals

more and more regulations come. There will not be

to break into cybersecurity.

enough people. We need tools and processes that are automated within GRC. That would be my number one thing in four or five years.”

Additionally, Broughton suggested other pathway’s for both organisations and those wanting to career transition is use the skills you have today to get into

Trivedi said; “There will be a huge demand for data

an organisation that has a team and role you want to

and cloud security professionals, because everything

move towards in the future.

is on cloud these days, whether it’s on the vendor side, or in house. We are also seeing a surge in demand

TECHNICAL ASPECTS STILL MATTER

for application security professionals who will help

Blok touched on the more technical aspects of

secure codes at the fundamental level.”

RAISING CYBER AWARENESS

the industry with skills and automation. “there is a shortage of all technical skills within cyber” due to the lack of skilled overseas resources entering the market

Panel moderator, Laura Lees, Vice President, of

so employees are more likely to be willing to “upskill”.

ISACA’s Sydney Chapter, said the security awareness

Then there is the “shift towards security automation”

role presented opportunities for non-technical people

and “automation is going to become more a part of

to break into cybersecurity.

what people are asking for”.

“I know one organisation that has a graphic designer on their cyber team, because that’s a great way to get

WOMEN IN SECURITY MAGAZINE

69


NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

C O L U M N

How parents can keep up with apps and online games Have you ever clicked into Apple’s App Store or Google Play Store and been thoroughly amazed at the number of apps there? At the touch of a button your tween/teen could download any app their heart desires. It’s nervewracking, knowing some of these apps and online games have hidden dangers. You’ve heard other parents talk about situations you never want your child to find themselves in, and you’ve read dozens of media reports on dangerous apps. The good news is you don’t have to be across ALL those apps and games, just the ones already installed on your child’s device and the ones they ask to download. Here are 10 tips to help you decide which apps are OK for your tween/teen. 1. Know what apps and online games your kids are currently using/playing/have downloaded. 2. Make sure the settings on your child’s devices block them from downloading apps without your permission. 3. Check the game ratings in the App Store/Play Store. 4. Understand the basic functionality of apps and online games. For example, does the app allow anonymous chats, private/public groups? Does it contain frequent swearing, nudity or encourage gambling? 5. Download the app/game yourself to get a better idea of what it does. Use it yourself. Then sit with your child and play.

70

WOMEN IN SECURITY MAGAZINE

6. It’s OK to tell your child that, although an app looks safe for their age, you just aren’t sure about it. Explain why. Suggest downloading a game they want and playing it with them so you can make a final decision. 7. Consider your child’s maturity. Have you educated them about online safety? Do you already have rules around the use of apps and social media platforms? 8. Make sure you have turned on the setting that prevents your child from re-installing deleted apps. (Settings > iTunes & App Store purchases > tap to turn off) 9. Have a list of reliable sources you can consult. Great websites to bookmark are https:// www.esafety.gov.au/, and https://www. commonsensemedia.org/. 10. Google can be your friend. A few searches on Google can confirm whether or not an app is one you want your tween/teen to be using. Remember – you are the parent guiding your child’s online activities. There will be times when you will need to loosen the reins and times when you will have to give a flat out ‘No’. You know your tween/teen best. So follow your feelings.

www.linkedin.com/in/nicolle-embra-804259122/ www.thetechmum.com www.facebook.com/TheTechMum

www.pinterest.com.au/thetechmum


INDUSTRY PERSPECTIVES

WOMEN IN SECURITY MAGAZINE

71


DR DAVID STOCKDALE

THE YEAR THAT WAS 2020:

AN AUSCERT PERSPECTIVE ON CYBER THREAT INTELLIGENCE by Dr David Stockdale, Director AusCERT, Australia’s Pioneer Cyber Emergency Response Team

M

uch has occurred over the past

Criminals took advantage of the rapid (and often

twelve months, in all aspects of

chaotic) transitions that many organisations went

life, cybersecurity included. Daily

through in early 2020, which correlated with AusCERT

life has changed, and we have

experiencing a peak of reported member incidents for

been required to adapt in both

quarter one, 2020 in March.

our social environments and our

workplaces. Many people have pivoted to working from home using a variety of IT equipment, both old and new; patched and unpatched, supported and unsupported. Additionally, our perception of what is “safe” versus “unsafe” is very different when we’re sitting with a laptop at the kitchen bench with no one to remind us of the ever-present cyber threats. The risk profile has changed, sadly creating an opportunity for the cybercriminal, and one that has been exploited significantly.

In addition to the volume of activity, we also know organisations that had not implemented a strategy for secure remote working were significantly more likely to be impacted by some form of cyber disruption than those that were prepared. In 2020 AusCERT assisted with over 3,800 reported member incidents, on average fourteen incidents (“tickets”) per day. The three most commonly reported incidents were phishing email response, incident response advice and malware analysis. AusCERT also issued more than 4,700 security bulletins, more than 200 of which originated from the AusCERT team. Security bulletins are a fundamental tool to streamline security patching.

72

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

ADAPTATION IS KEY TO WINNING THE BATTLE: 2020 CYBER SECURITY SURVEY RESULTS

compromises will result in a further rise of spoofed or compromised payments.

Australia, we surveyed organisations across Australia

INSIGHTS FROM THE FBI INTERNET CRIME COMPLAINT CENTER (IC3)

and New Zealand. We were able to clearly assess

In 2020, the IC3 agency saw a 69 percent increase

the COVID-19 pandemic’s impacts on cyber, and

from 2019 in the number of complaints. Reported

detail significant shifts in the way organisations

losses from Internet crimes exceeded $US4 billion

are impacted by, and responding to, evolving cyber

with Australia ranking fifth as a nation in terms of the

threats.

number of victims reported.

Our survey results showed a definite shift in

2020 also saw a large increase in elderly victims of

attitudes by organisational leaders when it came to

Internet crime. Statistics provided by IC3 showed that

cybersecurity preparedness. COVID-19 was a ‘cyber

approximately thirteen percent of complainants were

reality check’.

aged over sixty, with total losses in excess of $US960

For the fifth year in a row, with our partner BDO

Respondents indicated a significant increase in data breaches caused by malicious hacking and accidental disclosures by staff. This increase is indicative of the support challenges presented by remote working, and of a lack of preparedness for increased cyber-attacks. Organisations that already had secure remote working capabilities, approximately sixty percent of the respondents, experienced 40 percent fewer incidents in 2020. Those unprepared experienced (and reported) four times the number of data breaches and payment directions, and three times the number of business email compromises and malware infections.

million. Tech support scams were identified as the top ranking Internet crime category affecting these elderly victims.

PREPARATION IS THE KEY WORD WHAT’S NEXT? We prepare through knowledge and planning - with our knowledge informed by information, in this case, cyber threat intelligence. Cyber threat intelligence comes in many forms, from the operational through to the strategic; even via public agencies. During 2021, AusCERT will develop its capabilities to deliver more of this information, at all levels, to make organisations safer.

“CYBER THREAT SIGNAL”, KEY 2021 PREDICTIONS BY THE CERT COMMUNITY

While there are doubtless many unknowns awaiting

In late 2020, AusCERT, alongside CERT partners from

us in 2021, here are some key issues on the AusCERT agenda this year:

Korea, India and Sri Lanka, released a joint prediction of the most pertinent cyber threats that 2021 might deliver. Perhaps to no one’s surprise, ransomware attacks were expected to dominate the sector in 2021 in both volume and impact. We also predicted the emergence of “masspearing” – the combination of spamming and spear phishing based on intelligence gained from the dark web – along with an expansion of the dark web markets for sensitive information, in particular a surge in

Expand and enhance our delivery of threat intelligence.

Remain a trusted incident response partner, both locally and globally.

Consistently and usefully engage with our members.

The cybersecurity landscape is ever-changing, and AusCERT continues to be passionate about engaging our members to empower their people, capabilities and capacities.

authorisation information. The remote workforce will continue to be targeted

www.linkedin.com/in/dr-david-stockdale

leading to greater corporate data leakage. And increasingly sophisticated business email WOMEN IN SECURITY MAGAZINE

73


QUEEN A AIGBEFO

WHY DID THE TITANIC SINK? by Queen A Aigbefo, Research student, Macquarie University The date May 31, 1911; the location, Belfast,

An organisation’s board and C-suite are often

Ireland. Thousands of people gathered to watch the

concerned about the return on security investments,

Titanic launch, at the time the world’s largest ship.

and, as the saying goes, if it’s not broken, it does not

The Titanic was a beauty to behold and boasted

need fixing.

numerous luxurious features, especially for firstclass ticket holders. The Titanic was also fitted with state-of-the-art-technology: elevators and wireless communication systems that could transmit and receive Morse code.

a decrease in security spending. Boards may not always fully comprehend that consistent security investments are necessary to prevent cyber-attacks rather than cutting security budgets, managements

Yet just over a year later on the night of April 14, 1912,

should reassess their risk landscape and refocus

four days into its maiden voyage from Southampton

on areas where the business is most vulnerable as

to New York City, the Titanic struck an iceberg and

employees adapt to the new normal, post-Covid.

sank, taking the lives of many on board, including the

They should reassess the organisation’s business

Captain.

and security risks, vulnerabilities and threats before

Multiple errors of judgement, process and procedure contributed to the ship’s demise, and they provide salutary lessons today for those charged with securing organisations against cyber-attack.

YOU GET WHAT YOU PAY FOR Research into the loss of the Titanic discovered that, to save cost and speed up construction, low-quality steel had been used for the rivets that held the ship together. Cost-cutting, despite being a popular strategy to secure the financial position of a business or government department can have dire consequences.

74

The global pandemic in 2020 led to budget cuts and

WOMEN IN SECURITY MAGAZINE

making cuts to the security budget that may result in future costs far in excess of any savings achieved.

A BIRD OR A PLANE The lookout crew stationed in the Titanic’s crow’s nest had no access to binoculars. Before departure the ship’s second officer was transferred off the Titanic. He had the key to the binoculars store in his pocket and forgot to hand it over. Communication is essential to effective and efficient cybersecurity of organisational information assets and resources. The security terrain is always evolving, and changes should be communicated properly down the security line as they occur.


I N D U S T R Y

P E R S P E C T I V E S

Lapses in communication prevent information flow from top to bottom and from bottom to top. Management needs to plan and duly inform employees when changes occur so employees know where they can get access to security resources, and how to avoid getting stymied when dealing with cybersecurity complexities. Additionally, the Titanic’s radio operator had received several iceberg warnings that night. Most of these he passed along to the bridge, some he dismissed. A judgement call not to relay a particular iceberg warning to the ship’s captain became a costly mistake a few hours later. Employees are often not aware of the consequences of their actions when dealing with security processes or procedures. They may not be interested in staying abreast of the evolving security threat landscape and may not understand how a simple action, such as downloading a piece of software, could initiate a cybersecurity attack. As the security landscape evolves, organisational managements need to keep employees updated on security risks and threats peculiar to their business sector. When employees are aware of likely threats, the organisation stands to benefit by getting feedback on vulnerable business processes where a malicious actor might gain access to the security management system. Cybersecurity is everybody’s responsibility, not just an IT function.

SOUND THE ALARM After the Titanic struck the iceberg the captain failed to sound a general alarm. Some passengers on board did not fully comprehend the direness of the situation until it was too late. Employees are usually called out (or sent to training) when they mistakenly click on malicious emails and links. In most cases their work colleagues remain ignorant of the fact that cybercriminals have attempted to gain a foothold in the organisation’s network. It is best to sound the alarm and inform employees about every intrusion attempt so they can recognise when they are being socially engineered. It has been more than a hundred years since the Titanic’s sinking in the North Atlantic Ocean, but we

DON’T SKIP THE DRILL

can still learn from the mistakes that contributed

Lifeboat drills were scheduled to be held on the

to the disaster and resulting loss of life. Security

Titanic every Sunday, but on Sunday April 14, the drill

investments to ensure the protection of organisational

was cancelled. Later that night, the poorly-trained

information assets are vital.

crew were ill-equipped to carry out the evacuation

However, it is also essential to equip employees with

procedure. As mentioned previously, employees who are less aware of security threats and not properly trained are more susceptible to being exploited as attack vectors by cybercriminals. Periodic security training exercises, drills and awareness campaigns will keep employees alert for security incidents. Humans are the weakest

the appropriate security skills and resources to enable them to recognise and resist social engineering tactics. As a captain steers a large vessel through treacherous waters to successfully arrive at harbour, organisations also need to navigate the treacherous security sea, avoiding “icebergs” in order to stay afloat.

link in the security chain. However, they are also the best last line of defence if equipped with appropriate

www.linkedin.com/in/queenaigbefo/

security training, knowledge and resources. twitter.com/queenaigbefo

WOMEN IN SECURITY MAGAZINE

75


GENDER EQUALITY WON’T WORK WITHOUT THE SUPPORT OF MEN, TOO by David Braue

As the prime minister’s woes have laid bare, male leaders must set the standard for gender equality

T

echnology companies around the

believe strongly in allyship,” she explains. “Seeing men

world celebrated International

participate gives [other men] permission to say that

Women’s Day in different ways, but

this is OK – and maybe it’s something that I should

their common goal – to raise the

think about.”

profile and promote the equality of women – resonated so strongly with

the senior executives of Progress Software that they gave all of the company’s 1500 staff, in 16 countries, the day off. It was just one day but, Sara Faatz says, represented “a huge step” in support of the company’s efforts to promote diversity among its workforce.

By engaging men in the group’s diversity initiatives, adds Faatz – a senior manager on the firm’s Telerik and Kendo UI developer relations team – men come to understand that gender inequality is about much more than simply “men not being good to women”. “It’s good for men to see that what we’re talking about is an empowerment, and needing to change perspective. When they don’t understand intent, it’s

“A lot of companies talk about diversity, and this

easy for people to be antagonists – but if you can

was a really powerful way of showing that this is

provide a safe environment for allies to participate,

something that we as an organisation believe,” she

that’s when barriers are broken down.”

explains, noting the ongoing efforts of an internal group of like-minded diversity champions known as

ORGANISING FOR CHANGE

Progress for Her.

Over the past decade, that shared goal of breaking

“The goal is to support women, empower women,

down barriers has driven a global subset of the

provide leadership and networking opportunities, create the tools they need to create influence, and to create a supportive space to amplify women’s ideas and concepts in an inclusive environment.” Importantly, she notes, the group has also welcomed numerous men from across the company: “we

76

WOMEN IN SECURITY MAGAZINE

women in tech movement by which men are being explicitly engaged to bring new perspectives to something that many have been quick to dismiss – often because they believe their company simply doesn’t have a gender inequality problem. One of the key voices in this targeted engagement of men has been the Champions of Change Coalition,


F E AT U R E

which was founded in 2010 by then Australian Sex

compassionate, no BS, no games, and underpinned

Discrimination Commissioner Elizabeth Broderick and

with integrity and a commitment to making the way

has since expanded to include sixteen groups and

we work better for everyone.”

250 industry leaders across 10 industries.

Kane’s support for female-friendly initiatives such as

Broad and deep support for its mission – of having

job sharing has helped entrench gender equality for

men stand beside women in the push for gender

employees of Kane’s cybersecurity team – and set an

diversity – is producing concrete results, with

example for other parts of the business as well.

the group’s Impact Report 2020 confirming “an improvement in organisational gender equality actions and a sustained increase in women’s representation in most employment categories.” Those improvements are coming thanks to “members stepping up and leading innovative and disruptive initiatives designed to challenge the status quo and shift (disrupt) the systems of inequality beyond their organisations and industries,” the report notes. Driving that disruption through the IT industry in general – and cybersecurity in particular – has been particularly successful under the leadership of executives like NBN Co’s Darren Kane, whose efforts towards gender equality were recognised with the 2020 Women in Security Awards as a Male Champion of Change.

“Without a strong leader championing and prioritising that change,” his supporters noted in nominating him for the award, “none of what we have achieved would have been possible.” Similar stories recognise the superlative efforts of the other category finalists – including Victorian Department of Premier and Cabinet CISO Shane Moffitt, CyberCX CEO John Paitaridis, WA Police CISO Hai Tran and highly commended winner Matthew Wilson, CEO of Penten. Working with his management team towards a 50/50 gender split within the company, Wilson credited “innovative initiatives” around sick, reservist, domestic violence, carer’s, paid parental leave and paid super on another 26 weeks’ unpaid leave, as well as the availability of multicultural and paid training and study leave.

Over the course of his more than five years with the company, co-workers commended his “decisive and compassionate leadership” that is “real and

WOMEN IN SECURITY MAGAZINE

77


CHANGE COMES FROM THE TOP – BUT GROWS EVERYWHERE

Cybersecurity firm CyberCX, for one, has added the

Much of the dialogue about engaging men in gender-

to the board along with other key business metrics

equality initiatives revolves around engaging with

current gender split as a core KPI, reported monthly – and ensuring that gender diversity remains at the

male CEOs and senior executives – a necessity

forefront of the board’s priorities.

in an industry where men still hold the majority of

“We’ve got a lot more to do,” says chief people officer

executive roles.

Snezana Jankulovski, “but it’s not easy. It’s something

Normalising pro-equality viewpoints at the top of the

we’re absolutely committed to, and we’ll continue to

leadership pyramid is about much more than token

focus on.”

wins and media sound bites: cultural change trickles

Finding ways to insert the cause of diversity into

down, and engaging with vocal policy-setters helps

everyday conversations – keeping it top of mind

establish and maintain the right tone for like-minded

across the company – can be the difference

men to follow – reprogramming the organisation to

between backing gender equality with headline

normalise gender quality.

workforce policies, and building a durable, top-to-

“We should all be not only striving to achieve

bottom business culture where the contributions

diversity requirements,” says Bevan Slattery, founder of industry networking venture Cloudscene, “but

and capabilities of women are intrinsically valued as much as those of men.

also be fundamentally improving our approach and attitude to inclusivity in our workplaces and

the success of those initiatives

“It’s good for men to see that what we’re talking about is an empowerment, and needing to change perspective. When they don’t understand intent, it’s easy for people to be antagonists – but if you can provide a safe environment for allies to participate, that’s when barriers are broken down.”

than through the feedback of direct

Sara Faatz, Director, Developer Relations at Progress

taking tangible action to make a difference. Whether it’s related to gender, race, age, or any other minority group, change comes from the top down.” There’s no better way to measure

reports, whose perceptions of successes around gender diversity – and lingering shortcomings –

can be crucial in understanding cultural roadblocks that are maintaining problematic issues.

Leadership, Culture and People team – advises

“My managers are all very supportive and my

of equality through every part of the organisation, and

colleagues and I look after each other,” says Mandy Turner, manager of the University of Queensland Cyber Security Operation Centre (CSOC). “That’s extremely important because we are all just trying to

managers to use five key strategies to drive the cause to keep it alive as part of everyday operation. These include creating internal networks and encouraging both men and women to participate

protect the university from cybercrime.”

in external networks; improving visibility of women

“It’s an ever-changing landscape, and we don’t need

high-visibility projects, and facilitating broad career

to be worried about whether we will be supported in what we do. If businesses want cybersecurity teams to work really, really well, then managers need to be very supportive of their teams and their people.”

by rotating staff through roles, appointing them to experiences; reviewing criteria for promotions, ratings, pay, and bonuses to ensure equitable representation; “normalising life needs” by embracing diverse types of leave and flexible work policies; and

Given men’s ongoing prevalence in senior executive

proactively confronting behaviours that marginalise

roles, one way to steadily push towards gender

women.

equality is to find ways to represent the current situation in ways that make sense to them.

78

Christie Struckman – a vice president within Gartner’s

WOMEN IN SECURITY MAGAZINE


F E AT U R E

A JOURNEY OF 1000 MILES BEGINS WITH A SINGLE STEP The consequences of failing to stamp out discriminatory behaviour and language have been writ large in the media this year, with the toxic Parliament House culture – and the reverberations once such a

10 WAYS MALE EXECUTIVES CAN STEP UP Executive consultant Katherine Lazaruk offers 10 tips for men who want to improve their engagement and support for women colleagues

culture is exposed – a precautionary tale for men at

and employees. These include:

every level, in every organisation.

1. Explicitly tell women they can succeed, that

Gartner advises leaders to watch out for telltale behaviours that indicate a less-than-ideal commitment to gender equality – things like overexplaining, gender-biased language, assumptions about a woman’s lack of confidence, ignoring women, idea theft, profiling, tokenism, use of pet names, and more. Executive coach Katherine Lazaruk, of LZRK Consulting, knows better than most male executives think and what they need to do to improve their participation in the push towards gender equality. “I’ve been working with some strong alpha m ale leaders in… male dominated industries on their leadership presence,” she writes, “and have been

they are capable, and that they belong in the field. 2. Actively engage and sponsor women into different roles and activities. 3. Talk about their capabilities to others and give them explicit credit for their roles/ experience. 4. Suggest possibilities to them for further work/study/engagement opportunities. 5. Realise that women don’t always step up, speak up, or put up their hand – so call on them. 6. Participate in women’s diversity programs

encouraging them to broaden their perspective on

to recruit young women for your field, and

what leadership looks like.”

create them if they don’t exist.

She believes that “it’s time for male leaders to step

7. If you hear gendered messaging or jokes, or

up and become champions so we can advance the

notice the work culture isn’t welcoming to

pace when it comes to achieving gender parity” – and

women – call it out and work to change it.

offers 10 tips for male executives to be proactive about building female-friendly cultures (see sidebar). Based on progress to date, the engagement of men has been a powerful ally in promoting the cause of women in security – whether in levelling the playing field when choosing a career, building a culture that abolishes the intimidation and subtle gendered exclusion, or any of the myriad other ways that men can help the cause of equality. Jacqui Lostau, founder of the Australian Women in Security Network (AWSN), believes the conversation has passed the tipping point – and that companies now approach her to ask if she can nominate some good candidates for their roles, rather than asking her to explain why diversity is important.

8. Be aware of the study results on negative effects of bias. Educate yourself on unconscious bias and how people engage. 9. The negative talk/challenging/competitive nature/macho style of interaction in STEM (and elsewhere) is bad for both men and women, but particularly for decreasing engagement with women. Watch yourself and be intentional with your communication. 10. Stop treating pregnancy like an illness. Challenge policies where maternity leave/ return to work isn’t flexible, and where men don’t get to participate in paternity leave/ early involvement with their children.

“That conversation has shifted now, and people understand,” she says. “Most people understand that diversity is important, and they want to do something about it.”

WOMEN IN SECURITY MAGAZINE

79


JOANNE WONG

A MORE SECURE FUTURE: THE CASE FOR ENCOURAGING FEMALE PARTICIPATION IN AUSTRALIA’S CYBER SECTOR The cybersecurity workforce is skewed towards young males, but there are tremendous opportunities for young women who enter this fast-growing profession. Let’s encourage them to do so, writes Joanne Wong, Vice President International Marketing APAC and EMEA, LogRhythm. Hands up who remembers when ICT was almost a

Women lost jobs and hours of work at a greater rate

female-free zone; the exclusive province of geeks in

than men after shutdowns were implemented last

polo shirts?

year. They bore the brunt of additional responsibilities

As an industry, we’ve come a long way in the last couple of decades. Recent research from Access Economics suggests women now comprise around 28 per cent of the local ICT workforce, up from just 16 per cent in the late nineties and early noughties. As I see it, further increasing the percentage of women would be good for the industry and good for women, particularly today when there’s much talk of a ‘pink collar recession’, a reference to the fact that women have suffered disproportionately more than men as a result of the COVID crisis.

80

WOMEN IN SECURITY MAGAZINE

at home, such as childcare and home schooling, and it looks likely they’ll find it harder to obtain stable, reasonably-paid work going forward.

JOBS FOR THE FUTURE Government efforts to stimulate the economy out of the COVID downturn have focused on construction, infrastructure and the rapid launch of ‘shovel-ready projects’ to create economic activity and jobs. It’s not a bad approach, but there’s no getting around the fact that most of those jobs are for men. There’s been less effort expended on coming up with initiatives


I N D U S T R Y

P E R S P E C T I V E S

to get women back ‘on the tools’ in hard-hit service

STEERING GIRLS INTO STEM

industries like retail, hospitality and childcare.

All this adds up to attractive career opportunities for

One place where women’s talents could be put to

women who are willing to enter the cybersecurity

good use is the sphere in which I’ve earned my living

sector, and now is the time we should be encouraging

for the past seven years: cybersecurity.

them to do so. This means engaging with girls in their

Even before COVID, the industry was severely shorthanded, and the rapid digital transformation triggered by the pandemic has only exacerbated that shortage. According to AustCyber, we’ll need an additional

high school years, building their interest in STEM and educating them about the plethora of possibilities the ICT industry in general, and the cybersecurity sector in particular, have to offer.

18,000 cybersecurity professionals by 2026 to ensure

In short, we need to get girls excited about the

the country’s digital security needs are met.

possibility of a future in technology – and we need to ensure the pathway to that future is well signposted

BUILDING A HIGH-TECH ARMY

and well lit.

If we fail to reach those numbers Australian

As female cybersecurity professionals we can all do

businesses and organisations will be increasingly

our bit by sharing our stories and offering mentorship

vulnerable to cyber-compromise and attack, from

and support to students and women who are new

sophisticated state-based actors, criminal syndicates

to the industry. Those of us in senior roles may also

and opportunistic hackers.

be able to advocate for more ‘gender fairness’ in

The federal government has committed $1.67 billion over the next decade to programs aimed at helping businesses, organisations and individuals better protect themselves. Skilled personnel will be a big

our own organisations, via the introduction of hiring, retention and performance appraisal policies that ensure women are given every opportunity to excel and advance.

part of the solution, with the government expected to

That’s what I’ll continue to do, this year and beyond.

employ its own cyber officers to provide an outreach

As someone who’s enjoyed a wonderfully satisfying

and advice service for small and medium sized

and rewarding career in the sector, I believe it’s

businesses.

my time to pay it forward. If enough of us do the

Large businesses won’t be relying on the state to secure their systems and data. Rather, we’re seeing them redouble their efforts to ensure they have solutions and skilled staff in place to lessen the

same, we can make a real difference to female representation. Helping more women secure, interesting well-paid work in cybersecurity means a safer future for them, and for our country.

likelihood of them becoming the next hack attack victim to hit the headlines.

www.linkedin.com/in/joannepeileewong/ www.linkedin.com/company/logrhythm/ logrhythm.com/

WOMEN IN SECURITY MAGAZINE

81


HOW TO GET MORE GIRLS INTO STEM by Stuart Corner

I

pursuing careers that require science, technology,

10 YEAR MASTERPLAN FOR WOMEN IN STEM

engineering and mathematics (STEM), the

Kingsley said one of the most important initiatives

n a bid to get more women, especially girls,

Australian Government created the Office of the Women in STEM Ambassador in 2018 and appointed professor Lisa Harvey-Smith as the

inaugural Women in STEM Ambassador, the first position of its kind in the world. She was re-appointed for another two year term in September 2020. The office is one of several initiatives in Australia designed to increase the percentage of Australians pursuing STEM related careers. Isabelle Kingsley, research associate for the Office of the Women in STEM Ambassador, detailed some of these and, in particular her organisation’s aims and achievements, in a presentation at #Choose to Challenge, an online conference organised jointly by ISACA’s Sydney and Melbourne Chapters and the Australian Women in Security Network (AWSN), held for International Women’s Day, March 9.

82

WOMEN IN SECURITY MAGAZINE

to get more women into STEM was a 10 year plan called the Women in Stem Decadal Plan, developed by the Australian Academy of Science in collaboration with the Australian Academy of Technology and Engineering. It offers a vision and opportunities to guide stakeholders as they identify and implement specific actions they must take to build the strongest STEM workforce possible to support Australia’s prosperity. “It’s our roadmap. We follow this plan, with the goal in 10 years of really shifting the dial to get more girls, studying STEM and more women in STEM roles, but also in senior leadership positions,” Kingsley said. “Most of the work of the government and many organisations [to get more women into STEM] is driven and guided by this plan.


F E AT U R E

“We’ve identified some of the barriers we want to

EVALUATING STEM INITIATIVES

tackle. Then we look at what has worked before, and

Her organisation has developed a national evaluation

we base what we’re going to do on evidence. Then we look at what we did, what was the outcome. So we measure, we evaluate to find out what works and how to improve what doesn’t.”

TARGETING TEACHERS AND PARENTS She said teachers and parents were the main influences on children, so the Office of the Ambassador had launched a project to educate these people on STEM opportunities for girls.

framework for girls into STEM initiatives. “We put together a resource called the Evaluating, Stem Gender Equity Programs Guide. It’s a really useful, very simple, step-by-step tool to measure your initiatives and your programs in your workplace, to see if they’re actually doing what you want them to do,” she said. “The guide breaks evaluation down into five steps, defining what you’re trying to achieve, planning your activity or your program and your evaluation:

“We have a big awareness raising initiative called

designing it, executing it, and then how to share it

Future You. There are video games and characters

publicly and openly and transparently.

that have really cool STEM jobs that challenge the stereotypes. We are trying to engage young people into thinking differently.”

“We published this in December and our plan is to get this broadly used across the country for equity programs, and make evaluation a condition for

She said the campaign, in October and November,

funding a lot of the programs that do get funded

had been very successful. “We were able to see that

by the government, and then have a repository of

we had increased kids’ interest in stem from 36

evaluation so people can look at what’s been done

percent to 63 percent, and threefold for the girls.”

before, see all the evaluation findings, see what

There were many similar programs run by other

worked, what didn’t.”

organisations. “One of the best places to find all of those programs, especially for school kids is the STARportal run by the Office of the Chief Scientist,” Kingsley said.

WOMEN IN SECURITY MAGAZINE

83


RISK-TAKERS AND CHALLENGERS - WOMEN IN CYBERSECURITY STARTUPS by Kirstin McIntosh, Head of Partnerships, CyRise

Where are the women in Australian cybersecurity

in cybersecurity startups. It is not a career path many

startups? That’s a question I am often asked. And I’m

people are aware of, or decide to take. Corporate

probably one of the few people who can answer that

cybersecurity roles offer good money, interesting

question. As head of partnerships at CyRise, I work

work, structured career progression and job security.

with some of the most talented and ambitious people in the cybersecurity community.

Faced with this attractive alternative, people who choose to work in cybersecurity startups have to really love what they do. It’s not for everyone. Those who make the choice face job uncertainty, low pay compared to mainstream cybersecurity roles, and crazy hours. Startup roles are all-consuming, but

CyRise is a venture accelerator funded by Deakin University and NTT that champions early stage cybersecurity startups in the APAC region. We invest in founders who are building innovative and globally

the lure of future success, and the opportunity to take charge and create. Most of all, those in these roles see the potential for their ambition, energy and ideas

scalable products, and we help accelerate their

to make an impact on the world.

growth.

Interestingly, when CyRise and the Australian

Since 2017 CyRise has invested in 27 startups,

Information Security Association (AISA) ran an online

and five of those are led by women founders. They account for 18 percent of our portfolio. However, that’s not a complete picture. Alongside these women

survey in 2018 asking about five-year career goals, 26 percent of respondents saw themselves working in a cybersecurity startup. There was no difference

founders there are women who work inside startups

between men’s and women’s responses.

and women who support startup founders. They have

In 2020, under the shadow of COVID-19, CyRise

something in common: they are all risk-takers.

STARTUPS IN THE AUSTRALIAN CYBERSECURITY INDUSTRY

84

come with the adrenaline rush of constant learning,

had many conversations with people from different backgrounds contemplating a career change, wanting to develop a big idea or solve a problem. So, perhaps there will be a surge of new startups over the next

AustCyber estimated there were about 26,500 people

12 months, and more women seeking a career in the

working in cybersecurity in Australia in 2020, but few

startup world.

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

WOMEN IN CYBERSECURITY STARTUPS

The most recent (and only) Australia-wide startup report, Startup Muster 2018, reported that 22.3

1. THE FOUNDER

percent of respondents who had founded startups

At CyRise, we track cybersecurity startup founders,

and 37.1 percent of those planning a startup were

often from the very early stages of a product idea.

women.

We talk to as many as we can to help them progress. Some people may never go further, but others pop up and surprise us. We never know where a brilliant new startup founder will emerge.

More recently, the State of Australian Tech Report 2020, released in March 2021 by PauseFest, said: “The data we received regarding the founders’ backgrounds is a representation of the Australian

We have identified 13 women founders out of

startup sector as a whole in that it is still very much

202 active early-stage startups, six percent of the

male-dominated, with women underrepresented

Australian cybersecurity startups we track. Seven of

across STEM and leadership positions.”

these companies have the woman founder in the role of CEO. There are only three companies where the woman founder leads alone, without the support of a co-founder.

The Australian government recently set up a $52 million Boosting Female Founders grant funding initiative with the aim of increasing the number of female founders who scale their businesses successfully.

We have started two businesses, the first was a consulting practice, and our second a startup. It was a natural progression for me. Consulting is really hard - you have to find work for every staff member all the time. We sold this business, and decided to challenge ourselves to do hardware. It’s exhilarating when it starts working. You own everything. You are creating everything. The good is you, the bad is you. It fuels itself. It’s The ex-consultant who seeks a challenge

so motivating to know you are doing something you are in charge of, something people want.

TRACIE THOMPSON

I never have Monday-itis. I am excited to get up every day to start work.

CEO and Co-founder, HackHunter

I’m always driving things forward to meet our goal, being challenged with a roadblock, thinking on my feet. It’s exciting and invigorating knowing we can do it. I know that we, as a team, can solve anything that comes up.

I love “getting shit done”. I don’t think that far ahead. I’m a medium term planner. In startup life, there is no need to plan too far ahead. Being able to adapt quickly and get shit done is very appealing after 15 years in corporate life where change happened through templates and plans that were pushed up through the ranks before anything could happen. Freedom to do what needs to be done is amazing. Culture is important to me. I thrive in fast-paced, supportive cultures. The corporate escapee

SUSIE JONES

I love sharing and creating the culture I work in, rather than having to adapt to somebody else’s. We talk about “People for Susie”, and it’s been an interesting challenge to create that from nothing.

CEO and Co-founder, Cynch Security

WOMEN IN SECURITY MAGAZINE

85


2.THE BUILDER In startups, often only the founders get noticed. Yet there are key team members who contribute their talent to a startup’s growth. There are currently no statistics available for the number of women working in cybersecurity startups in Australia. Here’s the voice of one woman builder who chose this path.

I am knowledge-greedy. I want to know it all. Technically, I’m an electrical engineer who retrained. My background is completely different from cyber, but the principles are the same. If a company is willing to allow me to grow, I will join it. However, it was really hard to find a job as a woman and an immigrant. People see you as your role, and don’t want you to expand it. Even though I was capable, I was stuck and bored and not valued. A mentor pointed me towards startups. “You can learn on the job. They will allow you to achieve what you want, and you will help them. You won’t get The voracious learner

paid a lot, but you will enjoy it.”

YAEL STEINBURGER

It was the best decision I ever made. I achieve my goals, and I am doing

full stack software engineer, badook.ai

almost everything. I now have a wider view, which helps me make better decisions and create better solutions. So I am pleased and satisfied. You don’t get paid much. It’s a small place, like a family, and you aren’t a number.

3 . T H E PA R T N E R These awesome women play key roles in the cybersecurity startup ecosystem, yet are the unseen champions of our small community. Simply put, without them quite a few Aussie startups would not exist today.

I was a snowboarding instructor working in Australia, Canada, Austria and the States, when I first met Paul, and he followed me to Australia. Paul McCarty founded SecureStack in November 2018. I didn’t really know what we were in for with SecureStack. Was I brave, or ignorant? I put a lot of trust, both in Paul and in his confidence in his idea. I knew he could do it. It’s exciting, and even though it is taking a lot longer than we thought, I’m The Gold Coast snowboarder

ELLE MCCARTY SecureStack

still ok with it. It was more of a challenge and a shock than I expected. Paul was able to do one or two days consulting a week while starting SecureStack. It was important to have that buffer, along with a good nest egg of savings it. He keeps me involved. I feel SecureStack is part of me. He gets excited, so I get excited! We enjoy the wins together.

86

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

Thoughts on why there aren’t more women in the

Yael Steinburger of badook.ai is forthright about

cyber startup scene:

the cultural changes required around gender roles

This is a complex question. It is certainly bound up in the wider debate of diverse participation in the technology sector as a whole. On top of that, there is the unhelpful stereotype ‘hoodie/ hacker’ reputation of cybersecurity. But startups? Don’t they offer an alternative? Here’s some searingly honest views that

“Management must be feminists - they should measure you on your concrete attributes, not your organs or where you come from! More equal attitudes will make a difference. It is changing, and it’s slow. But I am optimistic.” Susie Jones of Cynch Security believes there to be

are important to acknowledge if we are to affect change. •

Startups as a career choice: “People still don’t know that startups are a thing. Most equate working for a startup with working for a small business. People like working in large corporates, and want to solve big problems right now.”

“I love “getting shit done”. I don’t think that far ahead. I’m a medium term planner.”

Financial stability impacts choices: In the 2018

- Susie Jones

Startup Muster report, 37.5 percent of founders

CEO and Co-founder, Cynch Security

agreed that life circumstances requiring a stable income were the main hindrance when founding a startup. “The money does matter - you are paid less, you have less financial stability, and •

it’s all-consuming.”

a great story about what startups offer - “We can

Motherhood: “Being a startup founder and a

talk about all the good stuff and the opportunities

mother, it’s hard to balance.” “Women manage families. If you are a mother, it’s harder to take the risks. It takes time to develop or invest in yourself. This can prevent women from even starting.” •

Discrimination: “There are still a lot of double standards. I worked in an electronics startup and I had a female colleague from the most prestigious university in the country, but the founders gave her a low role, not in R&D where she would have fitted best. I am not going to fight this - I will go elsewhere. Your loss.”

What would help make a real difference? There are many ways to bring about change. Some

available that will attract women. Startups solve amazing problems. We have the ability to have a real impact on the lives of our customers. We actually help people - cyber is more than tech, it’s about people. What’s more, I could never have imagined I would have had access to such amazing people, who I would otherwise never have had cause to meet. And while it can be daunting to work with only five or six people, we have many interested people in the wider community always trying to support us.” People join startups for many different reasons. Personally, I am continually humbled by the courage and audacity of the cybersecurity founders I see. It’s an amazing journey, and I absolutely want to encourage more women to take that first step.

are systemic, some are attitudinal, and some are things we can do now, today. Improvements in the gender pay gap, and changes in women’s financial stability and domestic responsibilities will all have a huge impact on the participation of women in the economy, and will result in more women being visible

www.linkedin.com/in/kirstin-mcintosh/

www.cyrise.co/

in startups.

WOMEN IN SECURITY MAGAZINE

87


SPONSORS IP OPPORTUNITIES AWSN is now accepting new sponsors for 2021 Make a difference and help us create and maintain a supportive and inspiring security community for women Please reach out to sponsorship@awsn.org.au to discuss in more detail

Welcome to our 2021 sponsors so far: CyberCX CISOLens Afterpay IAG

88

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

AWSN INTERNATIONAL WOMEN’S DAY (IWD) 2021 CELEBRATIONS by Laura Jiew, AWSN National Social Media & Marketing Lead

March 8th is recognised as International Women’s

The event was moderated by the Hon Kate Lundy, and

Day (IWD) – a global celebration of the social,

featured a number of panellists, all with career paths

economic, cultural, and political achievements

that are challenging, fulfilling and important.

of women. This year’s theme was “Choose to Challenge”. Australian Women in Security Network (AWSN) members around Australia chose to mark the occasion by hosting several events during the week:

CANBERRA High tea & panel discussion, sponsored and hosted by Penten This Canberra event celebrated contributions made by women in the cyber, technology and security sectors in our nation’s capital.

• Katherine Ziesing, Managing Editor of The Australian Defence Magazine • Nina Terrey, Chief for Gender Equality and Global Partner of ThinkPlace • Eloise Robertson, ICT cadet in the Department of Home Affairs, Founder of the University of Canberra’s Supporting Women in STEM (UCSWIS), and AWSN Canberra Chapter Lead The event was very well received and left the audience looking forward to the next IWD event in 2022!

Image: Penten

WOMEN IN SECURITY MAGAZINE

89


PERTH

BRISBANE

Inaugural ‘Women Using Technology’ day, hosted by

What makes a successful security program - panel

Edith Cowan University

discussion

As part of International Women’s Day Edith Cowan

Our first IWD2021 event was organised by the AWSN

University invited girls in Years 10, 11 and 12 to a day

Brisbane chapter. Panel members included Isabella

of ‘courses, careers and connections’.

Manning, Jane Hogan, Teagan Cliff and Marie Bylina.

Women from AWSN, the Australian Computer Society

Each gave their views on “What makes a successful

(ACS)) Women in Tech and Women in Technology WA (WiTWA) provided two-hour workshops in which

security program?”, focussing on their individual areas of expertise:

each presenter shared a video of their workspace,

• Strategy, support and program management

outlined their career journey, including accreditation

• Delivery

processes, and staged a hands-on workshop that

• Business transition

simulated their job. Alice White, an AWSN Perth Chapter Lead represented her company, Atlassian, and spoke on the topic of cyber risks. Other topics covered included: • Ethical Hacking – Laura Davis, Raman Gill and Catriona Forde • Destructive Testing – Joanne Church

• Change management We hope everyone who attended and tuned in via Zoom benefited from the key points shared at this session. A copy of the recording from the event will be shared via the AWSN website in due course (member access only). We would like to thank our sponsors RiskLogic and Flex by ISPT for making this event in Brisbane happen.

• Scrum Master – Sonia Knox • Software Development – Zainab Meleki • Mathematics in 3D – Dr Julia Collins

SYDNEY AND MELBOURNE

• Chatbots & NLP – Michelle Sandford and

AWSN-ISACA joint event – IWD2021 Choose to

Jiaranai Keatnuxsuo • Machine Learning and AI - Elizabeth Antoine • Data Science – Anne Backhaus

Challenge March 9th was a flurry of activity across our two largest network cities: Sydney and Melbourne. The program consisted of several outstanding speakers and topics: •

Challenging with

Confidence - Kate Boorer •

In-Demand Skills and

Career Pathways - Ben Sawyer, Kate Broughton, Palak Trivedi and Riki Blok •

Don’t Reward the Brilliant

Jerk: Fix Toxic Security Culture Jinan Budge, Jacqui Kernot and James Turner •

Women Forging Innovation

Through Technology - Raisa Hashem, Jayne Leighton, Source: ECU, School of Science | Image credit: Dr Michelle Ellis

90

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

like to thank our sponsors and supporters: SheLeadsTech, EY, Cyber Leadership Institute, Amazon Web Services (AWS) and Privasec for making these sessions in Sydney and Melbourne happen. Over the week many topics were discussed and many minds fuelled with new ideas and the theme: “Choose to Challenges”. From challenge comes change, so let’s all

Image credit: Marie Bylina

choose to challenge. This year for IWD, Jacqui Loustau, AWSN Founder,

Martha Mckeen and Evangeline Endacott • Mentoring Matters - Sara Gray, Olivia Carline, Cindy Schwartz and Lilian Dean • Breaking Down the Barriers to Girls and Women’s Participation in STEM - Isabelle Kingsley • Why Cybersecurity and Resilience Matter, Especially to Women and Those who Love Them - Lisa Young • How to Challenge for Change masterclass -

challenged anyone and everyone to do something to help change the gender balance in the security industry. It’s not something we can achieve in all male dominated fields, but we can all help make the change in our own field. Every small thing can help make change. Everyone can do something. Everyone can choose to do something.

Markus Ottomar Winzer And finally, the day also saw announcement of the annual AWSN-ISACA scholarship recipients by the team from Cyber Leadership Institute. Congratulations to Charlotte Wood, Yvonne Sears and Annette Peploe! Colleagues from ISACA Sydney Chapter and ISACA

THREE ACTIONS ANYONE CAN TAKE TO HELP ENABLE GENDER BALANCE: 1. Take a chance on someone you see with potential 2. Be a mentor

Melbourne Chapter put in a terrific effort. We would

3. Call out inappropriate behaviour or gender bias

Image credits: ISACA Sydney Chapter and Privasec

Image credits: ISACA Sydney Chapter and Privasec

(discreetly or otherwise)

WOMEN IN SECURITY MAGAZINE

91


JEFF JACOBS

FROM RE-WRITING JOB ADS TO CHAMPIONING WOMEN’S ACHIEVEMENTS Here’s how IAG won the 2020 AWSN award for Best Place for Women to Work in Security by Jeff Jacobs, Executive General Manager, Corporate Security Group, IAG

Q: WHY IS DIVERSITY, PARTICULARLY IN RESPECT OF WOMEN, IMPORTANT TO THE CORPORATE SECURITY GROUP (CSG) AT IAG?

discussion, decisions and overall outcomes.

A: IAG has been taking diversity seriously for a very

about cybersecurity, the stereotypical image is still of

long time. I could see this for myself when I was

a guy in a hoodie. That’s so 1990s. It’s time for us to

first consulting here and then after I joined as a

change this image and move forward. Only when we

permanent employee.

have more women in the industry will we truly see the

In the Corporate Security Group we believe, first,

benefits they can bring.

that building a diverse team is just the right thing to do. Second, from my experience, you get better

92

WOMEN IN SECURITY MAGAZINE

Third, our industry is one of the worst in terms of the number of women working in cybersecurity, and that can’t be a good thing. When people talk and think


I N D U S T R Y

P E R S P E C T I V E S

Q: WHAT ARE CSG’S MAIN STRATEGIES FOR ENCOURAGING DIVERSITY? A: When recruiting, we make sure that the short list has enough women on it. Often you will hear recruitment firms say it is too hard—there aren’t enough women in the pool. When you hear that, don’t accept it. Ask talent teams to be creative, to focus on skills, and perhaps look in neighbouring fields. If they can’t do that, find others who can.

and talents to IAG, they also encourage the women in their teams—and across the industry—and work hard to bring more women into security.

Q: HOW WILL CSG CONTINUE TO ENCOURAGE DIVERSITY? A: Our team will continue to develop and implement the strategies outlined above, especially in recruitment and position descriptions, and encourage more of our women to play leadership and mentoring roles at an industry level.

We have also started to make sure that job ads aren’t worded to alienate women by taking out gender-specific stuff, such as terms associated with typical male stereotypes. we encourage the women already in CSG to build industry profiles, and engage with other women and mentoring programs. We also celebrate the success of senior women in

“I am determined to encourage our women to try new roles in our new fused cyber and protective services function, even if they don’t feel they are perfectly qualified for those roles.”

CSG—to both acknowledge their achievements and to attract more women into the industry.

Q: WHAT DOES WINING THE 2020 AWSN AWARD FOR BEST PLACE FOR WOMEN TO WORK IN SECURITY MEAN TO CSG?

We will continue to make sure women in CSG have

A: We are so proud to have won this award. It was a

women succeeding to know they too can succeed.

great acknowledgement that we are on the right track

Continuing to change our behaviour and culture is

at IAG. It was also an opportunity to draw attention to the women who work in security at IAG. Five won AWSN awards in their own right: Elaine Muir, who won Security Champion; Chen Yu, who won Best Secure

profiles within the organisation and their talents and work are showcased. Women need to see other

a big part of our plans. We need to make sure that women get the chance to speak. I have been in far too many meetings where some voices overshadow those of others. As leaders we need to be more aware when this happens and enable our women, and any

Coder; Rebecca Winfield, who won Best Champion

others who don’t get a chance, to speak up.

of Women in Protective Security/Resilience; Amanda

I am determined to encourage our women to try new

Pitrans, who won Best Newcomer in Protective Security/Resilience; and Natasha Passley, who was highly commended for Australia’s Most Outstanding Woman in Protective Security/Resilience. Every day these women not only perform their roles to the highest standard, bringing a diverse array of skills

roles in our new fused cyber and protective services function, even if they don’t feel they are perfectly qualified for those roles. Lastly, we will keep talking about this important issue. By keeping it on the agenda we have a chance to encourage and build more diversity, not only in IAG, but in all industries.

WOMEN IN SECURITY MAGAZINE

93


ABOUT JEFF JACOBS

Before joining IAG I spent 12 years in banking in

I am currently Executive General Manager of the

various roles, including as Chief Technology officer

Corporate Security Group at IAG. I started as the Chief Information Security Officer in November 2015 and my remit covered cyber strategy, governance, defence, response, assessments and education and

for Westpac Group, General Manager of Strategy and Architecture for CBA, and in delivery roles at Colonial First State. Prior to banking I was at both AMP and Zurich Financial Services in various IT and business

awareness.

roles.

A few years into the role I started to implement what

In my career I have had the pleasure to have been

we call internally our Security Fusion strategy. It is about merging security, safety and trust-like functions to reduce duplication, better share data and insights, and improve the way we keep our people, places and

almost always in roles where I worked on new and emerging technologies and trends, where the organisation was trying to build or uplift its capabilities, such as in digital, analytics, workspace of

data safe.

the future, cloud and cyber.

Initially this started with bringing into my team all

Jeff Jacobs, Executive General Manager, Corporate

aspects of physical security (which we call protective security) and co-locating our staff in a new joint security operations centre. Just recently we extended

Security Group, IAG, reflects on the importance of diversity, challenging workplace culture and what winning the award means to the company.

this fusion to include operational resilience, crisis management and internal fraud. Once again, we

www.linkedin.com/in/jmjacobs/

will look to co-locate our people to the new Security Fusion Centre, which, of course, will be both a physical location and a virtual one, because many people will be working remotely at various times.

94

WOMEN IN SECURITY MAGAZINE

www.iag.com.au


JOANNE COOPER

BUILDING THE FOUNDATIONS OF A NEW DATA ECONOMY by Joanne Cooper, CEO of ID Exchange Pty Ltd

For Joanne Cooper, CEO of ID Exchange Pty Ltd,

respond to data requests from consumers, not just

which in December 2020 launched the Australian

the Big Four as at present.

Data Exchange brand, a secure data sharing service, the opportunity offered by secure sharing of personal

FINTECH A KEY ATTRACTION

data was obvious. Data shared with consent, she

The second development is a talented and fast-

says, offers enormous potential for innovation and personalised services for consumers, businesses, healthcare and governments alike.

growing fintech sector being touted as a key attraction by the new Global Australia programme designed to lure high-flying businesses and

Today the market is nascent, but growing fast as the

individuals to the country.

enormous win-win potential of data sharing leads to a

Cooper is excited about what the next year will bring

surge of data-enabling technologies, most obviously in the fintech and regtech arenas. Two key developments are set to speed this up. The first is a critical phase of the government’s consumer data right (CDR) regulation coming into force on July 1. It will give consumers greater control over the consented use of their own data, including the ability to share it securely. This will see all banks obliged to

as education, innovation and opportunity collide. Data, she says, can be the fuel for a whole host of new services in both the private and public arenas, and is the bedrock of the growing sharing economy. However, there will be compliance and cost bottlenecks for access to this data unless it is held by the individuals who create it and shared with their consent, and on demand. Achieving this would open

WOMEN IN SECURITY MAGAZINE

95


I N D U S T R Y

P E R S P E C T I V E S

the door to unlimited innovation and progress. It is

banking services and

this model that Cooper, through a partnership with

opening up a wealth of

award-winning personal data sharing platform digi.

new options and services

me, is bringing to the Australian market.

for consumers.”

Cooper is a leading enthusiast and innovator in this

Australian Data

space and is excited at the opportunity to educate

Exchange sees itself

and make waves in the traditional banking services

as underpinning

world. She recently spoke at the Microsoft-sponsored

and accelerating the CDR regime. Cooper says

#ACCELERATERegTech2021 event on why good data

the creation of a data-enabling environment will

is the cornerstone of this new economy.

supercharge the CDR’s intermediary potential, enabling app developers to create tailored services

CONSENTED DATA SHARING A WIN-WIN

that leverage ethical data services with direct-

She says consented data sharing is a win-win for

to-consumer access, harnessing the innovative

both parties. “Businesses gain access to vastly richer, wider and more accurate sources directly from

data.

consumers, which in turn opens the door to a new

She firmly believes that this gives early-stage

wave of hyper-personalised and consumer-centric financial services that can be developed rapidly, free of the need, or cost, to establish and maintain costly backend infrastructure. “This is especially true in the financial services arena, where plug-and-play models are disrupting traditional

96

possibilities of wider, multi-source and consented

WOMEN IN SECURITY MAGAZINE

businesses, in particular, the ability to jump to the next level, confident that all consent and privacy considerations have been taken care of, leaving them free to focus on developing their service and unique selling proposition.


I N D U S T R Y

P E R S P E C T I V E S

rapidly to Australia’s enlightened open banking and data rights movements, and high rates of fintech adoption. Cooper says this positioning, in combination with being a gateway to the important APAC market, is helping push the country steadily along the path to economy-wide data sharing.

RIGHT PRODUCT, AT THE RIGHT TIME She likes to call digi.me ‘a little black dress’: a borderless and sustainable platform solution that complies with all privacy laws around the globe, making it always the right product at the right time, whatever the sector and whatever the use case. The need for a universal solution for smooth, secure, consented access to consumer data becomes even greater as governments worldwide seek to build back better after the COVID-19 pandemic. As the benefits of better direct-to-consumer reach become ever more obvious in multiple arenas, including health, it is also increasingly clear that an economy built on data is better for consumers, and

MAGIC CAN HAPPEN “Now the magic can happen through the ability to forge countless tailored value exchanges across every sector as the CDR cascades into other sectors of the economy including energy and telecommunications,” she says.

better for businesses, healthcare services, and for governments. Cooper has made it her mission to fulfil the potential of a global data economy: to lead, direct, accelerate and pull the various strands together. Collaboration and partnerships, she says, are the secret to success, and she is determined to leverage these to the hilt to

“As it does so, it will fast-track market disruptions

bring about a personal data revolution, for the good of

by turning on the tap to the most effective resource,

us all.

data.” She is clear that collaboration – both within Australia and across borders – is key to maximising the market opportunity for consumers and businesses alike. Examples of this collaboration include the imminent UK / Australia Free Trade Agreement (FTA), which has a specific focus on fintech, and the well-regarded Fintech Bridge between the UK and Australian governments, for which both ID Exchange and digi.me are ambassadors.

www.linkedin.com/in/joanne-cooper-50369734/ www.idexchange.me www.digi.me www.facebook.com/australiandataexchange.com.au twitter.com/idexchange_me

While Europe has traditionally been seen as the leader of fintech progress, the eyes of the world are turning

WOMEN IN SECURITY MAGAZINE

97


WENDY THOMAS

HOW SECUREWORKS CHAMPIONS FEMALES IN SENIOR ROLES by Wendy Thomas, President, Secureworks In 2020 the proportion of women in senior

conversation across the company. But I believe all

management roles globally was just 29 percent . This

organisations, including Secureworks, can make

would be a remarkable statistic in any year, but in the

a significant difference for female employees by

midst of a global pandemic, when one in four women

adopting a few simple, impactful practices, including:

1

were considering leaving the workforce to focus on caregiving, this was a wake-up call. The impact of the pandemic on women’s career trajectories remains to be seen, but as I consider the future of work and the opportunities for women to advance within it, I’m optimistic about what’s ahead.

1. Pay consistency regardless of race or gender. Despite the years of discussion and global attention on the gender pay gap, this is still a prominent issue for most organisations. Often, it starts at the beginning of a woman’s career and is perpetuated by organisations that

In the last 25 years I’ve held a series of leadership

base compensation on what candidates have

roles including chief financial officer, chief

historically earned rather than the position’s

product officer and, currently, president at a global

grade level and market value.

cybersecurity company. In these roles I’ve had the

As noted by the Center for American Progress, in

opportunity to pay it forward and share with others

the article: Quick Facts About the Gender Wage

the lessons I’ve learned throughout my career

Gap, “For context, a woman working full-time,

journey and create a culture that is both inclusive

year-round earned $10,194 [AU$13,404] less than

and rewarding. At Secureworks we strive to create

her male counterpart, on average, in 2018. If this

a new narrative for women working in technology, a

wage gap were to remain unchanged, she would

narrative of growth and opportunity equal to that of

earn about $407,760 [AU$536,150] less than a

their male counterparts. We are not perfect, and how

man over the course of a 40-year career.”

to best foster equity is an intentional and ongoing

One practice all companies can adopt to decrease the gender pay gap is to stop asking

98

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

for a candidate’s current compensation and using

FEEDBACK, MENTORS AND SPONSORS

that as the basis for their offer. Instead, the talent

In my experience, members of underrepresented

acquisition and hiring team can develop what they consider to be fair compensation for the role. 2. Recruiting practices. At Secureworks we’ve been scrubbing our job descriptions around pre-qualifying requirements that are nice-to-have versus must-have to ensure they encompass a broader talent pool. For example, some of our best and brightest employees don’t

groups, who don’t see someone like themselves in a leadership role, tend to be more hesitant to ask for mentorship, feedback, or support. This is why I encourage my leadership team to adopt three specific practices: feedback, mentorship and sponsorship. For women looking to grow into senior roles in their careers, I recommend they proactively seek out these opportunities. • Feedback: Seek feedback proactively, regularly,

have a traditional education, but their drive to

and with an open mind – and not just from

self-educate and pursue certifications is an

your managers. Colleagues, friends and family

impressive trait that makes them tremendous

members will also provide observations and

assets to the organisation.

feedback that can help you understand how

It’s also important to stay flexible and open to candidates with what were traditionally

you’re perceived, and enable you to grow. • Mentors: Though it is often mistakenly perceived

considered “gaps” in their resumé, particularly

as a one-way relationship, mentorship should

in the wake of the COVID-19 pandemic. For

be mutually beneficial. A great mentor also

example, a female candidate who took a year or

seeks knowledge, so it’s important to be

two off to home-school her children or care for an

equally thoughtful about what you bring to the

ailing parent shouldn’t be eliminated on that basis alone. 3. Flexibility. With broader adoption of the cloud and advances in collaboration tools and secure remote access, a growing percentage of the worldwide workforce can – either by choice or necessity – work from home. By eliminating the requirement that employees complete all work in a physical office during prescribed work hours, and by focusing on outcomes and impact rather than time spent, companies can reduce barriers to recruiting great talent. 1. A flexible approach can benefit everyone, but statistically, women carry the majority of household and family responsibilities even when both parents work full-time. According to a McKinsey report, “Women...do an average of 75 percent of the world’s total unpaid care work, including childcare, caring for the elderly, cooking, and cleaning.” Flexible working policies help those

relationship. • Sponsors: Identify your sponsors. Mentors are important, but careers rarely progress without strong sponsorship inside your organisation. Sponsors are the senior level people within the organisation who advocate for you, promote your work, champion your projects, and ultimately influence your career success. The cybersecurity industry is ripe with opportunities to build a rewarding career and to make a positive impact on the world. Our mission at Secureworks is securing human progress by outpacing and outmanoeuvring the adversary, and we have a unique opportunity in the current climate of growing social awareness and dialogue to drive fundamental change. I am honoured to pay forward all the helping hands I have had over my career, and to champion women’s success for the benefit of the security community. www.linkedin.com/in/wendy-thomas-7133283/

individuals create balance and manage priorities. Without this flexibility, organisations risk losing

www.secureworks.com/

out on great talent. 1

Grant Thornton, Women in Business 2020: Putting the Blueprint into Action (2020): p. 3.

WOMEN IN SECURITY MAGAZINE

99


20th Annual AusCERT Cyber Security Conference

11th - 14th May 2021 // The Star Hotel, Gold Coast, Australia

4

DAYS

50+ SPEAKERS

IN PERSON & VIRTUAL

Keynote Speakers

Ciaran Martin

Maddie Stone

UNIVERSITY OF OXFORD

GOOGLE PROJECT ZERO

REGISTER NOW

100

WOMEN IN SECURITY MAGAZINE

conference.auscert.org.au


TECHNOLOGY PERSPECTIVES


CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2

Start-ups, why you need to get security right from the start Security is important in any business, right? What

You continue with devilish speed for what feels like

about start-ups? Are they any different? Do they need

minutes but suddenly the power steering fails and

to have a focus on security? They are fast-moving

it becomes harder to control the car. You lift your

and innovative businesses that do not always have a

foot but then a tyre blows and the car starts to pull

free-flowing budget to spend on cybersecurity. They

wildly left and right. You are losing control. You hit the

want to focus on the core function of their business

brakes but the car doesn’t have antilock braking (It

and push forward at lightning speed towards

was built for speed not comfort and safety after all).

whatever goal they have set. Right? A “she’ll be right”

You panic and pull on the handbrake. The car jerks

attitude comes to mind.

sideways and flips, rolling over and over, throwing you

Picture this, you have a beautiful red sports car (I am a Mustang guy so let’s say it’s a Mustang). It’s shiny, it’s new and it looks like a million dollars. You get in behind the wheel and the fresh new car smell hits you. The soft but hugging leather seats seem to

plastic flying around the car, hitting you at every turn. There are no airbags. They didn’t think people cared about those. People just wanted to look good and go fast.

mould around you as though they were made just for

You don’t know how many times the car rolled. You

you. You reach over to grab the seat belt but there

are badly wounded, the car is lying on its roof and you

isn’t one. Strange, but if you needed it they would

can feel injuries everywhere in your body. I bet you

have put one in for sure.

wish they hadn’t cut some of those safety corners.

You hit the ignition button and you hear the engine roar to life. The sound of that V8 almost makes your heart jump out of your chest, but you calm yourself, grip the steering wheel. You’ve got this. You look around quickly to check your surroundings. Everything looks good so you punch the accelerator to the floor. The acceleration throws you back in your seat and you feel the rear end of the car slide out a little, so you let up on the throttle. You are screaming down the road so fast objects on each side are going by in a blur. Shouldn’t you slow down? No, let’s push it. You punch the throttle back to the floor and your pulse increases with the Mustang’s speed.

102

around the vehicle,. There are bits of glass and cheap

WOMEN IN SECURITY MAGAZINE

That seat belt could have kept you secure in your seat, the antilock brakes might have helped you keep control, and airbags might have protected you from further injuries. Yes, they probably wouldn’t have saved you from yourself, ignoring the dangers. And they wouldn’t have stopped the steering malfunction or even the tyre blowout. Those just happened. What about your decision to yank on the handbrake when all hell broke loose and you had already lost control? Too late, and not something that could have saved you from the ensuing catastrophe.


C O L U M N

Do you see the picture now? Or are you sitting there reading this going “what is he ranting on about?” What do a sports car and an idiot driving like crazy have to do with cybersecurity? Glad you asked (Well you didn’t really, but let’s pretend you did). Cybersecurity is very important for every business. It can help protect you and your business from oncoming threats. The seat belt could be your EDR (Endpoint detection and response) platform. It could help protect you from viruses, system breaches (or at least tell you about these so you can deal with them),

worst-case scenarios so they can cope with them when they happen. (Trust me, they will happen, just make sure you have a plan). Chaos does not end well for anyone. Yes you can survive, but at what cost?

malicious apps being run by unsuspecting staff, and

Could a major breach cost your company its

so much more.

reputation and destroy it when you’ve barely

The airbags could be your email protection and filtering. They could stop a scam email getting into your systems and to your users. They could stop

got started? Could you end up in the rubble of a collapsing office or a rolling car with no hope for recovery? This could be the fate of many start-ups.

users from clicking on a malicious link in an email, or

So, don’t treat security as an afterthought. Bake it into

opening an attachment.

your systems and processes. Make it an ingrained

Maybe some user awareness training could have taught your team members how to protect themselves from threats and maybe they would not

part of your business and culture. Don’t be that glimmering light that is shrouded in misery because you didn’t think security was important. It is.

have pulled the handbrake and panicked. Maybe they

Stop for a moment, think about this and make a plan

would have seen the scam or threat coming, stopped

to bring security to the top of your priority list. Then

and thought about the situation. They might have

you can get back to launching rockets into space, or

sought a second opinion, or called the person who

curing cancer. You can’t do any of those things if you

said they wanted their bank details changed. They just

don’t exist.

might have. Maybe the people behind this awesome start-up that shines like a glimmering sports car and moves at lightning speed will slow down for just a few moments. Maybe they will see the value for both them and their customers in getting things right first time. Maybe they will spend just that little bit more getting

www.linkedin.com/in/craig-ford-cybersecurity www.amazon.com/Craig-Ford/e/B07XNMMV8R www.facebook.com/pg/AHackerIam/ twitter.com/CraigFord_Cyber

those safety protections in place and planning for the

WOMEN IN SECURITY MAGAZINE

103


LAURA JIEW

“SHARE TODAY, SAVE TOMORROW” How AusCERT helped its members tackle the recent Microsoft Exchange server ProxyLogon critical vulnerabilities and exploits by Laura Jiew, Events and Marketing Communications Coordinator AusCERT, Australia’s Pioneer Cyber Emergency Response Team

O

n the 2nd of March, news broke

customised for each of our member organisations,

revealing that multiple zero-day

based on their supplied IPs and domains and drawn

Microsoft Exchange vulnerabilities

from AusCert’s large overseas and local threat

had been exploited.

intelligence feeds of information on incidents that

AusCERT quickly communicated this news to its members by retweeting

Details from the Shodan scan were shared with

the active exploitation advisory from Volexity, a

affected members, and they were offered assistance

security firm based in Reston, Virginia USA.

with interpreting the results, patching their systems

This was quickly followed by a security bulletin alert

and checking for compromise.

the same day and the sharing of multiple articles

As time passed, the vulnerability became known as

through ADIR; the AusCERT Daily Intelligence

the ProxyLogon exploit and the party responsible was

Report, a summary of curated infosec news we

identified by the Microsoft Threat Intelligence Center

email to subscribers by close of business, Monday

(MSTIC) as a state-sponsored threat actor named

to Thursday. We also monitored and facilitated a

HAFNIUM.

number of discussions on our member Slack channel and relayed all relevant information to our members.

It became clear to AusCERT that ProxyLogon was evolving. The associated AusCERT security bulletin

Following the release of our security bulletin alert, our

is now in its fifth iteration and the team has also

team of analysts quickly conducted a Shodan scan to

produced a blog titled “Patching for HAFNIUM is just

determine the effects of this exploit on the AusCERT

half of the story.”

member constituency as part of our Member Security Incident Notifications (MSINs) service. MINS are relevant and security reports containing notifications

104

have been detected by other parties.

WOMEN IN SECURITY MAGAZINE

On the 12th of March, the Australian Cyber Security Centre (ACSC), the Australian Government’s lead agency for cybersecurity, issued a high level alert


T E C H N O L O G Y

P E R S P E C T I V E S

advisory to members of the Australian public which

At the time of writing, Microsoft has claimed that

did much to raise public awareness of the severity of

around 30,000 of a total of 400,000 Exchange email

this exploit.

servers deployed on-premises across the world

AusCert would like to acknowledge and thank our colleagues from the Shadowserver Foundation team

are still vulnerable to attacks associated with the ProxyLogon exploits.

for releasing nine special reports on ProxyLogon as

Until there are no more indicators being published

part of its Shadowserver Special Reports – Exchange

and shared by the various cyber threat intelligence

Scanning series.

agencies within our sector, it is important to remain

On the same day that ACSC issued its high alert

vigilant.

advisory on ProxyLogon, Shadowserver distributed

We hope that by sharing our experience in dealing

to 120 National CSIRTs and more than 5900 network

with this wide-scale, highly-publicised cybersecurity

owners across 148 countries (a group that AusCERT

exploit, we can encourage organisations to be

is proud to be a part of) the first instalment of its

proactive with their cybersecurity posture -

special report series containing information on what were believed to be victims of the HAFNIUM Microsoft

“share today, save tomorrow.”

Exchange Server exploits.

As a not-for-profit organisation, AusCERT is

Our team of analysts conducted further analyses

passionate about engaging with members to

and reached out to all affected members each time a detailed report came through from Shadowserver. These emails contained remediation advice additional

empower their people, enhance their capabilities and capacities, and help them prevent, detect, respond to and mitigate cyber-based attacks.

to standard patching and mitigation steps. www.linkedin.com/in/laurajiew/

WOMEN IN SECURITY MAGAZINE

105


MEL MIGRIÑO

MANAGING DATA RISKS IN INDUSTRIAL CONTROL SYSTEMS by Mel Migriño, group CISO of Meralco, co-founder, Women in Security Alliance, Philippines Industrial control systems (ICS) are critical for the

2. Implement an external DMZ to provide access

delivery of power, water, transport and other essential

to external facing assets. No transit traffic is

products and services. This makes them a favoured

allowed across servers located in the DMZ.

target for cyber criminals motivated by financial gain or ideology. Attacks can also come from market competitors or employees with malicious intent.

3. Provision a next generation firewall between each security zone to control the traffic and detect any malicious traffic between network

Compromise of an ICS network could produce a

zones. Strengthen the security of the network by

massive outage of a service such as transport or

implementing a unidirectional gateway to control

power, impact a great number of customers, and

the flow of information, and implement an

possibly plunge a nation into crisis.

intrusion detection system for traffic visibility.

For many years ICS were isolated from the Internet

4. Use strong encryption to ensure the integrity of

by an air gap, but today it is a different story. All

data on critical communications links, and data

the different components of these systems—smart

associated with important processes.

meters, controllers, sensors, etc—connect to the internet to send data to the Big Data platform that resides with the IT environment for correlation and insights and communicate to various IoT devices within the Enterprise of Things. This also makes them, potentially, accessible to anyone from anywhere. Hence it is imperative to implement a robust security framework for ICS, one that is commensurate with the level of risk associated with these networks. Here are some recommendations to safeguard the ICS environment: 1. Define a security zone. Segment the operational

5. Implement access control at all zone entry points. 6. Put in place a mechanism for visibility, detection and response with next generation anti-virus software integrated with a cyber incident response platform. Correlate traffic, user activities and information flows with a next generation Security Information and Event Management (SIEM) system for OT. These measures represent significant investment and require a lot of work, but they are essential to ensure the security of the rapidly growing number of integrated IT and OT systems.

technology (OT) architecture into at least five security zones, namely external third party connections, enterprise DMZ, enterprise, OT DMZ, and process and operations.

106

WOMEN IN SECURITY MAGAZINE

https://www.linkedin.com/in/mel-migri%C3%B1o-b5464151/


Aspiring Women in Security CISO Masterclass The Australian Women in Security Network (AWSN) in partnership with The Security Collective are excited to offer an exclusive short masterclass aimed at women who are aspiring to be Chief Information Security Officers. The CISO masterclass will provide both group and 1:1 coaching sessions for participants to understand potential career paths to CISO roles and to set goals for their own career progression. Starting 23rd March, 2021

Visit awsn.org.au for information about exclusive events, programs, and content. Join Australia's largest community of women in cyber and physical security.


EXPRESSION OF INTEREST SPONSORSHIP Source2Create is thrilled to announce the 2021 Australian Women in Security Awards. This hybrid event will be a glamorous Gala Awards evening based in Sydney. We will be welcoming our guests in person as well as via live stream. To be a part of this energetic initiative register your interest today for sponsorship opportunities.

Deadline for sponsorships: 20th May

I’M INTERESTED!

108

WOMEN IN SECURITY MAGAZINE


JACQUELINE JAYNE

THE 10 COMMANDMENTS OF HUMAN ERROR by Jacqueline Jayne, Security Awareness Advocate, KnowB4

THOU SHALT UNDERSTAND YOUR ROLE IN CYBERSECURITY

1. Thou shalt understand that you have a role to play in staying safe online

Let us start with the stats and nothing but the

2. Thou shalt complete all training and

88% of data breaches are caused by human error.

education 3. Thou shalt pay attention to the red flags of social engineering 4. Thou shalt ensure good password hygiene 5. Thou shall not walk away from one’s device and leave it unlocked 6. Thou shalt pay attention to your surroundings 7. Thou shalt dispose of all data and information in a thoughtful manner 8. Thou shalt report all suspicious activities 9. Honour thy company IT policies 10. Above all else, accept that cybersecurity is everyone’s

stats. In a recent report from Stanford University, In the same report, “One third of respondents (33%) told us they rarely or never think about cybersecurity when at work”. When you stop to think about it, this concept makes sense. We are working in a super fast-paced world where our attention is spread thin. For example, people in HR are focussed on HR, marketing people are focused on marketing and you guessed it, finance people are focused on finance. It does not matter what your role is, you need to protect the data in your business unit and keep cyber criminals out of your systems. HR are protecting all the Personal Identifiable Information (PII) for all employees and a lot of confidential information, marketing are the guardians of the brand, communications and sometimes Intellectual Property and I am sure you all know what finance are protecting. Your IT staff are working around the clock to protect everything all the time and they need your help.

responsibility

WOMEN IN SECURITY MAGAZINE

109


THOU SHALT COMPLETE ALL SECURITY AWARENESS TRAINING

THOU SHALT ENSURE GOOD PASSWORD HYGIENE

Oh no – please, not death by PowerPoint. Do

The five most popular passwords across the globe

not worry; there is no death by PowerPoint here.

are:

When the training you are asked to do is engaging, entertaining, educational, relevant and you learn something, it is not a chore. Especially when everything you are learning can help you stay safe online outside of work too. Annual security training is a thing of the past as the threat landscape is literally changing every single day and there is no way we

1. 123456 then 2. Password and 3. 12345678 followed by 4. Qwerty and finally 5. 123456789 When you think about it, remembering more than twenty unique passwords is not an easy task. Especially if each one needs to use a combination of uppercase, lowercase, symbols and numbers while

can bundle that all up in one session and expect you

being more than twelve characters long.

to remember it. That is not fair to you. When training

In Ponemon Institute’s The 2020 State of Password

content changes from a one-minute video to a tenminute eLearning module or even a highly addictive Netflix-style series, your ability to retain information is increased. As humans, we need to see or hear information at least three times before we start to remember it. Therefore, an ongoing program of training is the way to go.

THOU SHALT PAY ATTENTION TO THE RED FLAGS OF SOCIAL ENGINEERING Social engineering is a remarkable beast, as it is the act of manipulating people into performing an action or divulging confidential information. In most cases, the attacker never comes face to face with the victim. We see it in malicious emails (aka phishing) where the intent is to trick you into clicking on a malicious link or attachment and even a link that takes you to a fake login page where you can hand over your login credentials. The level of sophistication we see is high and the ability to spot all the red flags is getting harder. There are two other members of the ‘ishing family’ I would like to introduce to you. Smishing (the SMS version of phishing) and vishing (the voice version of phishing). Both of these attack vectors are as clever as their big brother phishing and we are seeing an increase in these attacks globally. It is unfair to expect a non-IT person to know all of the social engineering red flags without any form of awareness and education. NB: Check out our Social Engineering Red Flags resource here (safe link – copy and paste it into your browser if you prefer not to click on links) https:// www.knowbe4.com/hubfs/Social-Engineering-RedFlags.pdf

and Authentication Security Behaviors Report, 42% of organisations rely on sticky notes for password management and surprisingly, IT professionals reuse passwords more than average users. Google have reported that 59% of people use their name or birthdate in their password and 43% have shared their password with someone. To round off the stats, Microsoft reported that 44,000,000 – yes, 44 million of its users were found to have reused passwords. Therefore, consider the best practice for good password hygiene and use a password manager tool, use Multifactor Authentication wherever you can, change your passwords often and never reuse or share your passwords.

THOU SHALL NOT WALK AWAY FROM ONE’S DEVICE AND LEAVE IT UNLOCKED If I had a dollar for every time I walked past an unattended and unlocked laptop or desktop, I would have at least $3,402 by now. This is such a simple task to do, so why don’t people do it? It is because it is not a habit (yet). Get yourself a sticky note and write ‘Lock this device’ on it, then stick it on your keyboard or screen. This will help prompt you to remember. Good news! There is a short cut for locking Windows machines by pressing the Windows + L keys and for Macs, Opt + Cmd + Eject: Puts your computer to sleep and Ctrl + Shift + Eject: Turns off your monitor without going to sleep.

110

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

THOU SHALT PAY ATTENTION TO YOUR SURROUNDINGS 2020 saw the big shift to remote working, which added an extra layer of complexity for everyone. Cyber criminals stepped up their attacks because our guards are down when we are at home. Many people were using personal devices for work or using work devices for personal things. Additional distractions at home saw an increase in security issues, with more sensitive information being sent over email and personal online storage such as DropBox or Google Drive being used for business purposes. While the intent is not to cause a security breach or do the wrong thing, we must pay attention to the new

P E R S P E C T I V E S

we forget (or have never thought) that IT are there to support us all to get our work done in a safe and efficient manner. Make sure you read every policy and understand what your role is for each of them and if you are unsure, ask!

ABOVE ALL ELSE, ACCEPT THAT CYBERSECURITY IS EVERYONE’S RESPONSIBILITY If you have a license and drive a car, you have a responsibility to keep the car roadworthy and follow the road rules to stay safe. If you do not, you risk a fine and at the extreme, you could injure yourself or others. At your work desk, you have a responsibility

surroundings and modify our behaviour to suit.

to set it up as per the Work Health Safety regulations.

THOU SHALT DISPOSE OF ALL DATA AND INFORMATION IN A THOUGHTFUL MANNER

your screen and if you should need to move a box

Hopefully, this is a self-explanatory commandment.

Your chair needs to be at a certain height, as does of papers, you have a responsibility to pick it up correctly. If you ignore these guidelines, you risk injury or pain.

If you are in possession of confidential information,

The same goes with cybersecurity. As humans, we are

you are also responsible for disposing of it correctly.

the last line of defence and perhaps the biggest asset

Especially with remote working, one just cannot

when it comes to keeping the cyber criminals out of

simply throw out this information in your home

our networks. The human firewall is a real thing. It is

recycle bin. The best option is to store it in a secure

your responsibility as a parent to keep your kids safe

place until it can be shredded, or you can dispose of it

online, keep yourself safe online and protect your

properly back in the office.

place of work safe. If we accept this, keep up to date

THOU SHALT REPORT ALL SUSPICIOUS ACTIVITIES

with the cyberthreat landscape and take the time to stop and think before we act, the online world will be a much safer place for everyone.

If you see something, say something. This includes and is not limited to suspicious emails, SMS, phone

www.linkedin.com/in/jacquelinejayne/

calls, random USBs found lying around or someone who is trying to follow you into your place of work without a security pass or you might observe odd behaviour from a colleague. Take the time to stop and pay attention. Nothing is that urgent. Even if you are completely wrong, it is better to err on the side

www.knowbe4.com/ jacquelinej@knowbe4.com twitter.com/JakkiJayne

of caution. Gone are the days of ignoring suspicious activities. Please ensure that your IT team are made

Sources

aware of everything so they can investigate further.

https://www.tessian.com/research/the-psychology-of-humanerror/

HONOUR THY COMPANY IT POLICIES

https://www.comparitech.com/blog/information-security/ password-statistics/

I know that there is a collective sigh when we talk about policies. However, they are important and require acknowledgement and adherence. Sometimes

https://mms.businesswire.com/media/20200219005336/ en/773763/5/191522-Ponemon-Infographic-2020-final-1. jpg?download=1

WOMEN IN SECURITY MAGAZINE

111


GUILA TRAVERSO

WHY THE TRENDS IN CRYPTOGRAPHY ARE TRENDS? by Guila Traverso, PhD- Senior Consultant Cybersecurity, EY

Cryptography is the aspect of cybersecurity about

powerful supercomputer hundreds of thousands of

which I am most knowledgeable. And (I may be

years to solve. However, the protection afforded by

biased) it’s the core of cybersecurity. Sharing is

today’s cryptography enabled by these mathematic

caring, so I would like to give you some information

problems is under threat from the emerging

about cryptography, especially about recent trends,

technology of quantum computing. Quantum

and where they are heading.

computers (of large size) will enable these very

Cryptography uses mathematics to make data secure. Essentially this means attaining three

Quantum computers able to crack today’s

goals: confidentiality, integrity and authenticity.

cryptography are not expected to become reality until

Confidentiality is achieved through encryption that

after 2030, but there are a couple of reasons why we

makes data unavailable in clear except to the sender

need to worry today about the threat they pose.

and the designated receiver of the data. Integrity and authenticity are achieved through signature schemes that ensure data cannot be tampered with and that create digital signatures to verify the data.

Firstly, hackers could intercept and store internet traffic today that has long term value and wait until quantum computing is able to solve the mathematical problems used to encrypt that data.

Encryption and signature schemes rely on

There are certain datasets such as health records

mathematical problems that are, in principle, solvable

that retain value and remain sensitive for decades.

but that would, in practice, take even the most

112

intractable problems to be easily solvable.

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

Needless to say, the threat posed by quantum computing is spurring research to design and develop quantum-resistant cryptographic primitives (the wellestablished, low-level cryptographic algorithms used to build cryptographic protocols for computer security systems). Research to develop quantum-resistant cryptography is following two main avenues: postquantum cryptography and long-term cryptography. Post-quantum cryptography is the “computational” response to the quantum threat. Basically it means developing cryptographic primitives based on mathematical problems that are extremely difficult for even a large-scale quantum computer to solve. Plenty of research has been done in post-quantum cryptography and many good candidates for standardisation have been proposed. The US National Institute of Standards and Technology (NIST) announced in 2016 a call for proposals for postquantum cryptographic primitives to be included in a new standard for quantum-resistant security.

they are uncrackable by either today’s large supercomputers or tomorrow’s large quantum computer.

The standardisation process has several rounds of

Such cryptographic primitives are already available

evaluation. At each round some submitted candidates

to protect the confidentiality of long-lived data at

are rejected and the others go on to the next round

rest (secret sharing) or to enable compute operations

of evaluation. The latest round, the third, concluded

to be performed without revealing the input data

in July 2020 (see the NIST’s website for more

(multi-party computing).

information).

There you go. Trends in cryptography explained. I

Long-term cryptography is the information theory

hope I convinced you that cryptography is the core,

response to the quantum threat. It involves creating

and the most interesting part, of cybersecurity!

cryptographic primitives that are simply impossible to solve. The security of these primitives relies on an attacker not having information sufficient to solve the mathematic problems on which they are based. They are referred to as being ‘information theoretically

www.linkedin.com/in/giulia-traverso-phd-13a749150/

www.breakingthirty.com

secure’. These primitives can be used today because

WOMEN IN SECURITY MAGAZINE

113


MARISE ALPHONSO

LIFECYCLES WITHIN SECURITY by Marise Alphonso, Information Security Lead at Infoxchange

Do you remember learning about the lifecycle of

Human Resources. To raise and maintain awareness

a butterfly? A tiny egg turns into a caterpillar that

of cybersecurity it should be part of the induction

encases itself in a cocoon of silk from which, after a

procedure for new employees and part of ongoing

time, a beautiful butterfly emerges.

training and messaging. It is also important that

Security processes can be thought of as cycles of continuous improvement that must occur within an

and other resources they require to fulfil their roles.

organisation: essentially Deming’s cycle of Plan-Do-

Assets. Maintaining an inventory of information,

Check-Act (PDCA). Think of each of these stages as

IT systems and IT equipment assets that captures

phases of a capability maturity model. In a security

attributes such as classification levels and system

program there is the overarching PDCA theme, where

owners provides the basis for risk assessments,

security governance supports and enables business

business impact analysis, license management,

objectives by defining policies and controls to

support arrangements and maintenance

manage risk.

requirements.

When this works well, one could almost see a

Information. Information must be managed.

beautiful butterfly fluttering around!

This means incorporating security measures

Embedding security within the management of the following processes will serve an organisation well by addressing a baseline of information security-related risk. Policies. Policies are statements of intent set out and approved by management, and communicated to stakeholders. Policies and related documents such as standards and procedures require review and revision based upon changes in an organisation’s operating environment. It is important they are properly managed across their lifecycle.

114

individuals be given secure access to the IT systems

WOMEN IN SECURITY MAGAZINE

commensurate with its classification level and maintaining these across the lifecycle of creation, storage, use, sharing and deletion or retention of that information. Suppliers and third parties. The management of supplier relationships to ensure value for money for an organisation includes risk assessments when engaging a supplier, monitoring suppliers to validate achievement of expected service levels, adherence to contract requirements, and termination


T E C H N O L O G Y

P E R S P E C T I V E S

of engagements in accordance with the requirements of supplier contracts. Incidents. Security incidents provide a rich source of information for understanding where an organisation is vulnerable. Incident detection or notification, containment, eradication and recovery are

“Security processes can be thought of as cycles of continuous improvement that must occur within an organisation: essentially Deming’s cycle of Plan-Do-Check-Act (PDCA). Think of each of these stages as phases of a capability maturity model. ”

the steps that should be taken across an incident lifecycle. Ensuring feedback on the effectiveness of the measures

requirements including any changes that occur, and

taken in each of these steps will enable them to be

operational process changes made in response.

progressively refined, leading to improved security.

It is necessary to balance the risks faced by an

Software development lifecycle (SDLC) and

organisation against the rewards to determine

DevSecOps. Security can no longer be an

the extent to which these processes must be

afterthought. It should be built-in across all phases

implemented. Having the necessary checks and

of software development: requirements gathering,

balances ensures that security governance supports

coding, testing and, thereafter, deployment, operation

the achievement of business objectives.

and maintenance.

A well-functioning lifecycle is a thing of beauty. After

Compliance. To maintain corporate and security

all, who doesn’t love a beautiful butterfly?

governance and enable an organisation to meet stakeholder needs there must be a check on

www.linkedin.com/in/marise-alphonso/

applicable legal, regulatory and contractual

WOMEN IN SECURITY MAGAZINE

115


CHIOMA CHIGOZIE-OKWUM

SWIMMING ABOVE CEO FRAUDS by Chioma Chigozie-Okwum, Spiritan University Nneochi, Abia State, Nigeria.

CEO frauds, in which cyber criminals impersonate

out the legitimate party, and instruct the payer to

chief executive officers of organisations and lure

make payment to an account they control. This

unsuspecting victims into authorising fraudulent

happens without the parties being aware that there

transactions are not new, but they have become

has been a breech.

more prevalent and more sophisticated. With more women taking up CEO roles in organisations, we need to be conscious of how we can be exploited by cybercriminals through CEO frauds.

During the COVID 19 pandemic lockdown several enterprises suffered huge losses as a result of falling prey to CEO frauds. These can usually be spotted with careful observation, but executives pressed for time

CEO frauds are usually preceded by man(or

and with busy schedules often ignore the signs.

woman)-in-the middle attacks, where the criminals install bots to listen in on the communications of the parties involved in a transaction. With this technique they gather information about legitimate business transactions being undertaken between these parties. When they have sufficient details they impersonate the party receiving payment in the transaction, completely shutting

116

WOMEN IN SECURITY MAGAZINE

“In a fast moving world and with more transactions moving online, there is need for us to be cyber aware and stay safe online always.”


T E C H N O L O G Y

P E R S P E C T I V E S

4. Verify proxies, clients and contacts by looking out for them on social media platforms. Every notable CEO has at least one verifiable presence on social media. 5. Visit websites of the enterprises you are transacting business with. Do not rely on links provided by the proxy you are working with. Type websites into browsers and don’t click on links provided. 6. If you can, make an in-person visit, or send somebody to the location of the person you are Red flags that indicate cyberattacks of this nature

dealing with. This helps to verify claims. Some

include:

scammers go to extraordinary lengths to make

The criminals will tell victims who they should be communicating with to complete a transaction;

There is often a sense of urgency in their communications;

They present new links, phone numbers or email addresses.

The watchword to beat CEO fraud is alertness. Stay vigilant and doubt the authenticity of everything until

everything look normal online. An unscheduled site visit can uncover their plans. In a fast moving world and with more transactions moving online, there is need for us to be cyber aware and stay safe online always. www.linkedin.com/in/chioma-chigozie-okwum-376793122 www.facebook.com/chioma.chinakachigookwum

it passes integrity tests. 1. If you are an executive in an enterprise, ensure your enterprise runs a standard cybersecurity protocol. It is necessary to adopt both proactive and reactive approaches to security to ensure that channels are scanned for eavesdroppers and person-in-the-middle attacks. Ensuring that communication channels used to discuss business transactions are clear and devoid of compromise is a first step towards curbing this menace. 2. Always trust your gut feeling. If you have doubts about a discussion, or an email or even a link, follow your instincts. 3. Carry out independent research about company proxies and representatives before interacting with them to confirm they are in the roles they claim to be.

WOMEN IN SECURITY MAGAZINE

117


FARWA SAJJAD

THE FUTURE PROSPECTS AND CHALLENGES OF AI AND ML FOR CYBERSECURITY by Farwa Sajjad, Journalist & Cybersecurity Blogger

(AI) and machine learning (ML) are putting

FUTURE PROSPECTS OF AI AND ML FOR CYBERSECURITY

cybersecurity at significant risk, increasing the

In cybersecurity, time is vital. Security measures

The emerging technologies of artificial intelligence

volume and sophistication of cyberattacks and fuelling an unending cycle of offensive and defensive innovations.

need to work quickly to keep pace with hackers, and ideally, they need to be proactive and stay ahead of the challenges and threats. This is where AI and ML-

Every year is proving to be worse than the one before,

based tools excel.

and threats and vulnerabilities. Despite the steady

The most exciting thing about AI is that it can learn

increase in the instances of cyber-attacks, security threats are getting complicated and multifaceted.

users’ normal behaviour patterns, pick up anomalous behaviours and provide timely alerts to enable an

In recent times, an increasing number of connected

attack to be thwarted.

IoT devices add to the complexity of cyber threats,

A well-trained AI system can also recognise malware

making cybersecurity specialists more difficult. However, AI and ML can also aid cybersecurity and give experts additional resources to secure vulnerable data and networks from cyber attackers.

and ransomware attacks and quarantine them from the system. AI systems can scan multiple online sources for information about cyberthreats and, by combining various articles and studies, give great insight into cyberattacks, abnormalities, and prevention strategies far more rapidly and efficiently than any human reader. This enables cybersecurity companies

118

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

to keep up to date on the latest risks and develop strategies and tools to combat them. Moreover, AI systems can supplement and strengthen multi-factor authentication access controls, altering users’ access requirements and access privileges in real-time according to their network for access and location.

HOW AI CAN HELP ENTERPRISES DEFEAT CYBER CROOKS Intelligent systems powered by data-centric algorithms and innovative technologies such as machine learning can boost cybersecurity by detecting, responding to, and neutralising real-time threats. AI and ML technologies can learn about user behaviour patterns, specific signals, deviations, and vulnerabilities to detect and counter a threat early and protect the system from potential data breaches and intrusions. However, AI-powered systems are a double-edged sword: an integral part of both cybersecurity threats and solutions. Criminals use AI to create automated attacks and advanced threats. Cybersecurity specialists use AI to counter cyber-attacks and automate routine tasks, freeing them up to devote more resources to countering sophisticated

and interactions. Researchers working on different ML projects believe the cyber community and ML professionals can both play more active roles to better ML. Massive amounts of data can now be put under advanced analytics tools

challenges.

to gather valuable data-driven insights.

KEY CHALLENGES FOR MACHINE LEARNING AND CYBERSECURITY

cybersecurity experts who possess the

Machine learning has considerable promise to play a prominent role in cybersecurity by detecting potential threats and malware early, enabling security to be proactive. However, the technology is still immature, and challenges remain. By accessing appropriate datasets AI and ML can be used to investigate cybersecurity issues. Lack of such can pose a significant challenge to security practices seeking to exploit AI and ML for this purpose.

Still, there is a significant shortage of awareness and skills needed to work with AI and MLbased security algorithms.

FINAL THOUGHTS Despite all the challenges and problems, AI and ML have the potential to be competent technologies for dealing with cybersecurity threats and issues of all types. AI and ML will reach their full cybersecurity potential only if cybersecurity specialists enhance their expertise and understanding of these new technologies.

GREATER AWARENESS OF AI AND ML NEEDED

www.linkedin.com/in/farwa-sajjad-7b406a180/

At present, the use of ML in information security is

twitter.com/farwa_sajjad96

limited to understanding user behaviours, inputs,

WOMEN IN SECURITY MAGAZINE

119


HARPREET KAUR NAHAR

HOW TO BE DIGITALLY SECURE WHEN WORKING FROM HOME by Harpreet Kaur Nahar, Student at Edith Cowan University

The ‘new normal’ of working from home has created

USE A VIRTUAL PRIVATE NETWORK

many new opportunities for cybercriminals: home

A virtual private network (VPN) encrypts your Internet

computers with unpatched vulnerabilities; insecure WiFi networks, bad password practices. And the surge in collaboration tools like Zoom has created an avenue of attack that hardly existed before the pandemic.

traffic and disguises your IP address. Anyone able to access your internet traffic cannot see what websites you access and read the data travelling across that link. Many organisations will mandate use of their corporate VPN for staff working from home, but there

Fortunately there are a few simple measures that can

are also many services available that anyone can sign

greatly increase cybersecurity and make life more

up for and use.

difficult for the criminals.

TWO-STEP VERIFICATION

SECURE YOUR INTERNET CONNECTION.

This requires anyone trying to access an online

A hard-wired internet connection is much more

service with a password to confirm they are the

secure than wireless, but impractical for most homes.

password holder. A common two step verification

So the WiFi link must be as secure as possible. This

process is to send a text message with random

means having a long and complex password that

number to the password holder’s mobile phone

is used only for that WiFi service and, ideally, using

after they enter their password. This number must

separate WiFi networks for work and home-related

be entered to gain access. Users cannot implement

internet activity.

two-step verification if it is not offered, but where it is available as an option, it should always be activated.

120

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

KEEP YOUR SOFTWARE UP TO DATE

P E R S P E C T I V E S

person wanting to join a meeting must be

One of the avenues of attack most used by

manually approved (although this would be

cybercriminals is vulnerabilities in operating system

impractical for meeting with many participants).

software and applications. New vulnerabilities are being discovered all the time, and then countered by software developers issuing updates to their software. However it is usually incumbent upon users to install these updates – many fail to do so.

COLLABORATE SECURELY Collaboration tools like Zoom and Microsoft Teams require new practices and procedures that meeting hosts need to implement to ensure security. •

Every meeting should have a unique password so

Enable the waiting room facility so that every

Disable the features that participants will not require, such as screen sharing, file transfer.

All these technical measures are robust and reliable. Most cybersecurity breaches are achieved, directly or indirectly, because of the weakest link: people. If people follow these measures consistently, the number of successful cyber attacks will be greatly reduced www.linkedin.com/in/harpreet-kaur-nahar/

only those invited can participate.

WOMEN IN SECURITY MAGAZINE

121


DEIKA ELMI

BEWARE THE CYBERCRIMAL STATE IN 2021 by Deika Elmi, Security Risk Manager To top off an already dismal year, there was one final

because it was never widely released. North Korean

parting shot from 2020. In December of 2020, the US

state-affiliated actors hacked Sony Pictures, leaked

Government acknowledged a massive data breach.

personal information about Sony executives, and

US Secretary of State Mike Pompeo identified on

demanded Sony withdraw the film.

America’s digital infrastructure.

In a considerably less whimsical example, Russian

The attack began in March when the attackers

state actors in 2014 staged a series of cyberattacks

exploited vulnerabilities at Microsoft, VMware and

against American and European water and electrical

SolarWinds to breach three federal agencies. Affected

systems. They gained access to power plant control

agencies included the Departments of Defense,

systems and, even though they never actually shut

Homeland Security and Treasury along with hundreds

down or sabotaged the plants, they may still retain

of private companies, bringing the total to 250

access. In June of 2019 the US retaliated against

targeted entities.

Russia with a similar attack on Russian water and

It’s not as if government employees were giving out

power infrastructure.

their social security numbers to win a free trip to

These are only two examples of state-sponsored

Aruba. These were cybersecurity-savvy agencies.

cyber warfare. On some estimates since 2006, each

Yet the hackers were still able to access the email

with at least $US1 million in damages. So what can

inboxes of high-ranking officials at the US Treasury

we learn from this latest breach?

and Commerce Departments.

LESSONS

A CONCERNING PATTERN

The newest front in espionage and warfare is online,

Cyberattacks from state actors

right behind the screen you’re reading this on now. So,

are a growing trend. Remember

this is everybody’s problem. Here are some tips.

the 2014 Seth Rogan comedy movie The Interview about stoners

1. This could happen to you.

trying to assassinate North Korean

This isn’t just a problem for governments. Private

leader Kim Jong Un? Probably not,

companies like , were targeted for hacking, along with government agencies. It’s not as if the treasury

122

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

secretary used “Password1234” as his password.

P E R S P E C T I V E S

5. Red flags today mean white flags tomorrow.

These were sophisticated hackers and this breach could have affected you too. So no more mental

There were so many warning signs that SolarWinds

compartmentalisation. This is a problem for all of us.

should not have been trusted with this sort of access. Executives at the company ignored security warnings

2. Government and industry must share

three years prior to the attack. According to one

cybersecurity intelligence.

employee, the company was using outdated web

Cybersecurity is one of the most siloed and piecemeal

browsers and operating systems. And even worse,

national security concerns in the United States. As 9/11 taught us, the only way to avoid future attacks is to continually pool and unify our intelligence about the threat. 3. Cyberwarfare is an equaliser. In traditional warfare, one country’s soldiers fight another country’s soldiers. In cyberwarfare, there are no civilians. Any company with valuable information can be targeted by anybody else. Private companies must become accustomed to assessing their vulnerability to state-sponsored hackers. All is fair in love and cyberwarfare. 4. Know your cybersecurity vendors. With the rise of “smart” devices, any connected thing can become a Trojan Horse. In 2014, department

in 2019 the password for one of its servers leaked online. What was that password? solarwinds123. Yep, really. Finally, the company didn’t even remove the tainted software update from its website for several days after the Russian attack was announced publicly. 6. We’re all in uncharted waters. Most people don’t expect to deal with any sort of warfare (cyber or otherwise) when they start businesses. Hacks on the scale of the 2020 SolarWinds attack are truly unprecedented. Governments and private companies at every level are still calibrating how to respond. But here’s some positive news. While these hacks are insanely dangerous, they also haven’t [yet] caused any physical damage. So… hooray?

store chain Target was breached by exploiting the

7. Be open-minded.

systems of an HVAC vendor: the epitome of “not

Remember the optimist says things can’t get any

cool”. In 2017 attackers stole millions of credit card

worse, but the pessimist says, yes they can.

numbers and related data from Mandalay Bay, a casino, via a . So vet all your connected equipment vendors; there are other fish in the sea. Also, try not to be paranoid, but your smart fridge might be spying on you.

The discovery in 2020 of the SolarWinds attack is the latest and loudest alarm bell. Other sophisticated, state-sponsored cyberattacks are coming. But, since we’ve all received a crash course in immunology this past year, we know that, in response to a breach, the

SolarWinds is now famous for being a vector for

body produces antibodies. Similarly, our cybersecurity

cyberattacks but before that it was a popular network

efforts will have to rise to the level of the antagonists

monitoring company based in Austin, Texas. It was

trying to infect our systems.

probably compromised some time in October 2019. In March 2020 the hackers hid malicious code in a standard SolarWinds software update. About 18,000 companies downloaded the tainted update. The

So, if you’re a cybersecurity professional, or if you’re interested in improving your firm’s cybersecurity, keep these lessons in mind.

cyberattack was highly successful and wide-ranging because the hackers attacked the supply chain. So know your vendors. A company that doesn’t make cybersecurity a priority should not have high level

www.linkedin.com/in/deikaelmi/

twitter.com/DeikaE

access to your networks.

WOMEN IN SECURITY MAGAZINE

123


LISA ROTHFIELD-KIRSCHNER Author of How We Got Cyber Smart | Amazon Bestseller

Hello Friends,

My name is Olivia, I love to learn maths and science at school and I am very interested in technology! My teachers say I have a curious personality and are always encouraging me to learn more about the world. I also have a twin brother, Jack.

Try not to spend too much time on your device because you can damage your eyes. It’s also good to get outside and run around.

Never ever give out your personal information to anyone online and only chat to people you know like grandparents.

Last year for my birthday I got my first device, a tablet from my grandparents! I was so excited and couldn’t wait to use it so one night when my parents were asleep Jack and I snuck into the kitchen to take the tablet. We downloaded a game onto it and after we started playing on it another player wanted to play a game against us and we thought we would - but we shouldn’t have!

Don’t ever share any photos.

Never respond to any emails, app messages, or text messages sent by cyberbullies.

If you receive a nasty message you should save, screenshot, and print out the message as evidence of cyberbullying and never forward them to other kids.

The other player turned out to be a cyberbully and it was really scary.

Always show or tell a parent or teacher immediately if you are unsure about something that happened online or if you receive a nasty message.

Never download a game or app without permission!

Always be polite and respectful to others online and try to stay calm if something bad happens.

My cyber safety tips to you are:

124

Ask your parents and teachers to teach you how to stay safe online

Use your devices with a trusted adult’s permission and it is better if you are being supervised.

Keep and use your device in a shared area like the kitchen bench.

Sometimes parents use special controls and filters to help keep you safe from bad people and cyberbullies.

WOMEN IN SECURITY MAGAZINE

The internet is a wonderful tool to help you learn about the world but it’s very important to be safe. Stay safe online my friends, Olivia xo


Recom mend ed by F amily zone

How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary school-aged children.

READ NOW


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 01

02

1. MELANIE NINOVIC DFIR Consultant, ParaFlare.

2. AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist

03

04

3.MICHELLE ELLIS Outreach and Engagement Coordinator Computing and Security, Edith Cowan University Security Risk Manager

4.CATHERINE DOLLE-SAMUEL Business Continuity and Resilience Specialist at UNSW

05

06

5. SARAH YOUNG Senior Program Manager, C+AI Security Customer Experience Engineering (CxE) at Microsoft

6. MANAL AL-SHARIF Author of Daring to Drive

07

08 7. NICOLE MURDOCH Founding Director at EAGLEGATE Lawyers

8. DAISY WONG Cyber Culture and Engagement Lead at Department of Premier and Cabinet (Vic)

09

10

9. NICOLE STEPHENSEN Principal Consultant at Ground Up Consulting

10. AMBER UMAIR Security Operations Officer at Transport for NSW

126

WOMEN IN SECURITY MAGAZINE


11

12

11. LAUREN ZINK Security Training and Awareness Program Manager at Oportun

12. GABRIELLE BOTBOL Offensive Security Consultant at Desjardins

13

14

13. ANKITA DHAKAR Managing Director, Security Lit Ltd.

14. WINIFRED OBINNA Scrum Master at Blue Cross and Blue Shield

15. KAREN STEPHENS 15

16

CEO and co-founder BCyber

16. MEGHAN JACQUOT Cybersecurity Specialist | Google IT Support Professional

17. EMILY EDGELEY Public Speaking Coach for the Tech industry

17

18 18. BREARNA LEOPOLD Inside Channel Account Manager Australia & New Zealand

19. JESSICA TIEU Senior Director of Legal Asia Pacific & Japan

19

20

20. SAI K HONIG NSNWS BCA

WOMEN IN SECURITY MAGAZINE

127


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 21

22

21. NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

DR. DAVID STOCKDALE Director AusCERT, Australia’s Pioneer Cyber Emergency Response Team

23

24

23. QUEEN A AIGBEFO Research student, Macquarie University

24. JOANNE WONG Vice president international marketing APAC and EMEA, LogRhythm

25

26

25. KIRSTIN MCINTOSH Head of Partnerships, CyRise

26. LAURA JIEW AWSN National Social Media & Marketing Lead Events, Marketing and Communications coordinator for AusCERT

27

28

27. JEFF JACOBS Executive General Manager, Corporate Security Group IAG

28. JOANNE COOPER CEO of ID Exchange Pty Ltd

29

30

29. WENDY THOMAS President, Secureworks

30. CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2

128

WOMEN IN SECURITY MAGAZINE


31

32

31. MEL MIGRIÑO group CISO of Meralco, co-founder, Women in Security Alliance, Philippines

32. JACQUELINE JAYNE Security Awareness Advocate, KnowBe4

33

34

33. GIULIA TRAVERSO PhD- Senior Consultant Cybersecurity, EY

34. MARISE ALPHONSO Information Security Lead at Infoxchange

35

36

35. CHIOMA CHIGOZE-OKWUM Spiritan University Nneochi, Abia State, Nigeria.

36. FARWA SAJJAD Journalist & Cybersecurity Blogger

37. HARPREET KAUR NAHAR 37

38

Student at Edith Cowan University

38. LISA ROTHFIELD-KIRSCHNER Author of How We Got Cyber Smart, Amazon Bestseller

39. DEIKA ELMI Security Risk Manager

39

WOMEN IN SECURITY MAGAZINE

129


NEW

No#1 Best Selling Author of the "A Hacker I Am" Series, Craig Ford


HAVE YOU EVER DREAMED OF BEING A HACKER? Seemingly normal teenager Sam lives an exhilarating double life. Jump on board this twisting journey, take a swim through the deep dark corners of the hacker world and find out what this girl is made of. Does she have what it takes to survive or is she in over her head? Only time will tell but one thing we can be certain of is that the journey is going to be more challenging than she had ever imagined.

READ NOW

OTHER BOOKS BY THE AUTHOR


TURN IT UP

LOCAL AUSTRALIA PODCASTS

THE SECURITY COLLECTIVE By Claire Pales

CLICK TO LISTEN

CYBER IN BUSINESS

By Beverley Roche

By CTRL Group

CLICK TO LISTEN

CLICK TO LISTEN

The Security Collective, hosted by Claire Pales, is the podcast for all people who are interested in the foundations on which effective and robust cyber security is built on: people, process, data and technology.

Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life.

Cyber in Business, a platform where the best minds in cybersecurity share their insights with businesses. We operate on the belief that only a cyber secure business can outlast. This platform is all about information sharing and helping business leaders make more effective decisions.

OZCYBER UNLOCKED

GET WISE

By AustCyber

By WiseLaw

AFTERNOON CYBER TEA

CLICK TO LISTEN A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.

132

CYBER SECURITY CAFÉ

WOMEN IN SECURITY MAGAZINE

CLICK TO LISTEN Get Wise is a regular podcast organised by Principal - EJ Wise of the specialist cybelaw firm WiseLaw. Join us as we discuss emerging trends within the cybersecurity and legal landscapes, provide short snippets of advice on how you can boost your cyber resilience, and delve into the niche aspects of cyber law.

By PodcastOne

CLICK TO LISTEN Ann Johnson, Corporate Vice President, Business Development, Security, Compliance & Identity at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers.


KBKAST By KBI

CLICK TO LISTEN The Voice of Cyber - KBKast brings you interviews, discussions and presentations from global leaders across information security and emerging technology.

PRIVACY MATTERS WITH NICOLE STEPHENSEN By IoT Security Institute

CLICK TO LISTEN Privacy and the protection of personal data in the context of Internet of Things technologies. The Privacy Matters podcast, hosted by Nicole Stephensen is an initiative of the Internet of Things Security Institute (IoTSI).

‘THE OTHER SIDE OF CYBER’

THE AZURE SECURITY PODCAST

By Jacqueline Jayne and co-host James Azar

By Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

CLICK TO LISTEN From both sides of the world, it’s The Other Side of Cyber. Join your hosts James Azar and Jacqueline Jayne (JJ) as they go beyond the crime and explore the aftermath of the human element and the price we pay.

CLICK TO LISTEN A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/

THE NATIONAL SECURITY PODCAST By Policy Forum - ANU National Security College

CLICK TO LISTEN Chris Farnham and Katherine Mansted bring you expert analysis, insights and opinion on Australia and the region’s national security challenges in this pod from Policy Forum and the ANU National Security College.

ISACA PODCAST By ISACA

CLICK TO LISTEN The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities. WOMEN IN SECURITY MAGAZINE

133


TURN IT UP

GLOBAL PODCASTS

WOMEN IN SECURITY PODCAST By Lifen Tan

CLICK TO LISTEN This podcast is devoted to the world of information & cyber security and the great women who make it turn. In each episode, I sit down with a guest speaker to discuss their experiences and touch on some of the lesser known aspects of the industry.

By Monica Verma

CLICK TO LISTEN A technology podcast and an engaging platform for discussions and expert opinions on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and information security in support of technology and business.

HUMAN FACTOR SECURITY By Jenny Radcliffe

CLICK TO LISTEN Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.Podcast.

WE HACK PURPLE

THE CYBER JUNGLE

SMASHING SECURITY

By Tanya Janca

By Ira Victor and Samantha Stone

By Graham Cluley, Carole Theriault

CLICK TO LISTEN The We Hack Purple Podcast will help you find your career in Information Security via interviews with our host, Tanya Janca, and our guests from all different backgrounds and experiences. From CISOs and security architects, to incident responders and CEOs of security companies, we have it all. Learn how they got to where they are today! www.WeHackPurple.com

134

WE TALK CYBER

WOMEN IN SECURITY MAGAZINE

CLICK TO LISTEN The CyberJungle is the nation’s first news talk show on security, privacy and the law. Featuring digital forensics and infosec specialist Ira Victor and award-winning journalist Samantha Stone. The show is fastpaced and includes hard hitting news analysis. Formerly The Data Security Podcast.

CLICK TO LISTEN A helpful and hilarious take on the week’s tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It’s not your typical cybersecurity podcast...


on the couch WITH VANNESSA MCCAMLEY WWW.WOMENINSECURITYMAGAZINE.COM


OFF THE SHELF

FORESIGHT: HAVE YOU EVER DREAMED OF BEING A HACKER? Author // Craig Ford Dive into the life of a spunky, charismatic girl next door with Sam (Samantha), she is an only child of a broken family and has a truly devoted father who has raised her from a very young age. She is smart, kind, pretty and has that spark that you just can’t pin down. To anyone who meets her, she is just a good-hearted teenager who just wants to finish school and go to college. She does well at school, has a couple of close friends and is far from what you would call the popular girls. She truly fits the average girl next door stereotype. If you are looking at the fake life she lets the world see you would be right in thinking that was the case. However, she has a secret life. She has spent years living two lives, one as Sam for the world to see and one as Foresight, to Sam this is her true life where she is a truly gifted hacker. She has never found a system she could not bend to her will if she put her mind to it. She is the essence of a true hacker, a true magician of sorts in these dark recesses of the web not many dares to enter. Jump on board this twisting journey, take a swim through the deep dark corners of the hacker world and find out what this girl is made of. Foresight is book one of the hacker fantasy series. Book two will follow in 2021-22.

BUY THE BOOK HERE

A HACKER I AM

THE SECURE BOARD

Author // Craig Ford

How To Be Confident That Your Organisation Is Cyber Safe

A Hacker, I Am is not your normal cyber security book, it explains topics in stories, scenarios, without all the Jargon. Its fun, educational and you can read any chapter you want in any order you want. This book has been created to help everyone, not just the technical folk understand cybersecurity and the associated risks.

BUY THE BOOK HERE

A HACKER I AM VOL.2 Author // Craig Ford The book as you would have probably guessed it by now is all about Cyber Security but it’s not written to be overly technical, it’s written so that it can be understood by anyone who wants to learn more about how to better protect themselves. This book will be great at helping introduce individuals to the cybersecurity and help them get a better understanding of what to look out for, what problems we are all going to face in the future but also have a bit of fun while we are at it. .

136

WOMEN IN SECURITY MAGAZINE

BUY THE BOOK HERE

Author // Claire Pales, Anna Leibel With the collective global spend on cyber security projected to reach $433bn by 2030, the impact of cyber risk - be it reputational, financial or regulatory - must now be front of mind for all Directors. Written for current and aspiring Board members, The Secure Board provides the insights you need to ask the right questions, to give you the confidence your organisation is cyber-safe. Designed to be read either in its entirety or as a reference for a specific cyber security topic on your upcoming board agenda, The Secure Board sets aside the jargon in a practical, informative guide for Directors. “I recommend The Secure Board as essential reading for all leaders. It will equip you with the knowledge and foresight to protect your information and your people.” - David Thodey AO, Chair of CSIRO “[This book] will challenge you to stop, to reflect and then re-set some of your governance thinking. Anna and Claire, you have made a great contribution to the development of all Directors who choose to pick up this book.” - Ken Lay AO APM FAICD, Lieutenant-Governor of Victoria

BUY THE BOOK HERE


SECURITY FOR EVERYONE

SOCIAL ENGINEERING

Author // Authors Laura Bell and Erica Anderson

Author // Chris Hadnagy

Do you keep personal information and sensitive business documents on your laptop? Do you and your team use passwords, security keys, or credentials to protect your software and data in the cloud? Have you imagined the damage to your life and your business if these were revealed, exploited, or lost? No matter the size of your organisation, security affects us all. Large companies know the importance — and pay trained security specialists to work on security full time. But what about the rest of us? It’s time there was a comprehensive resource that helps any of us, no matter our role or the size of our business, keep our people, systems, and data secure. Securing your business can be daunting, especially when you’re small. That’s why Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.

BUY THE BOOK HERE

The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick, one of the most famous social engineers in the world-popularized the term social engineering.He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

CYBERSECURITY FOR EVERYONE Author // Amanda-Jane Turner Cybercrime is big business. As the use of technology increases, so does the opportunity for crime. There is no solely technical solution to stopping cybercrime, which is why it is important for all users of technology, regardless of age, race, education or job, to understand how to keep themselves safer online. To help all users of technology gain a better understanding of some cybersecurity basics, this book presents easy to understand information, with the added, and possibly dubious, bonus of entertainment in the form of limericks and cartoons. Stay informed and stay safe.

BUY THE BOOK HERE

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers.

BUY THE BOOK HERE

WOMEN IN SECURITY MAGAZINE

137


OFF THE SHELF

HACKABLE How to Do Application Security Right Author // Ted Harrington If you don’t fix your security vulnerabilities, attackers will exploit them. It’s simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you’re a technology executive, developer, or security professional, you are responsible for securing your application. However, you may be uncertain about what works, what doesn’t, how hackers exploit applications, or how much to spend. Or maybe you think you do know, but don’t realize what you’re doing wrong. To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world’s foremost companies secure their technology. Hackable teaches you exactly how. You’ll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You’ll build better, more secure products. You’ll gain a competitive edge, earn trust, and win sales.

BUY THE BOOK HERE

SECURITY RISK MANAGEMENT BODY OF KNOWLEDGE

INFOSEC ROCK STAR

Wiley Series in Systems Engineering and Management

Author // Ted Demopoulos

Author // Julian Talbot, Miles Jakeman A framework for formalising risk management thinking in today’s complex business environment Security Risk Management Body of Knowledge details the security risk management process in a format that can easily be applied by executive managers and security risk management practitioners. Integrating knowledge, competencies, methodologies, and applications, it demonstrates how to document and incorporate bestpractice concepts from a range of complementary disciplines. This is an indispensable resource for risk and security professionals, students, executive management, and line managers with security responsibilities.

BUY THE BOOK HERE

How to Accelerate Your Career Because Geek Will Only Get You So Far

Have you noticed that some people in infosec simply have more success than others, however they may define success? Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or “geek” skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock Star level success. The most successful, the Infosec Rock Stars, have a slew of other equally valuable skills, ones most people never develop nor even understand. They include skills such as self direction, communication, business understanding, leadership, time management, project management, influence, negotiation, results orientation, and lots more . . . Infosec Rock Star will start you on your journey of mastering these skills and the journey of moving toward Rock Star status and all its benefits.

BUY THE BOOK HERE

138

WOMEN IN SECURITY MAGAZINE


CYBERSECURITY ABCS Delivering awareness, behaviours and culture change Author // Jessica Barker, Adrian Davis, Bruce Hallas, Ciarán Mc Mahon Cybersecurity issues, problems and incidents don’t always relate to technological faults. Many can be avoided or mitigated through improved (A) cybersecurity awareness (B) behaviour (C) and culture change These ABCs are key components of the overall security status of an organisation.

GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS

A Hands-On Guide for Total Beginners Author // Sam Grubb

Author // Bill Nelson Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines allencompassing topic coverage, authoritative information from seasoned experts, and real-world applications to deliver the most comprehensive forensics resource available.

This book guides organisations looking to create an enhanced security culture through improved understanding and practice of cybersecurity at an individual level.

This proven author team’s wide ranging areas of expertise mirror the breadth of coverage provided in the book, which focuses on techniques and practices for gathering and analyzing evidence used to solve crimes involving computers.

Crucial awareness, behaviour and culture concepts are covered from the ground up alongside practical tips and examples, providing a key resource for those looking to create lasting cybersecurity awareness, behavioural and culture change initiatives.

While other books offer more of an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, introducing readers to every step of the computer forensics investigation-from lab setup to testifying in court.

BUY THE BOOK HERE

HOW CYBERSECURITY REALLY WORKS

It also details step-by-step guidance on how to use current forensics software and provides free demo downloads. Appropriate for learners new to the field, it is also an excellent refresher and technology update for professionals in law enforcement, investigations, or computer security.

You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-tograsp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you’ve gained into cyber-savvy skills that will make you safer at work and at home. You’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps. In addition, you’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.

BUY THE BOOK HERE

BUY THE BOOK HERE WOMEN IN SECURITY MAGAZINE

139


OFF THE SHELF

MALWARE DATA SCIENCE Attack Detection and Attribution Author // Joshua Saxe with Hillary Sanders “For those looking to become a security data scientist, or just wanting to get a comprehensive understanding of how to use data science to deal with malicious software, Malware Data Science: Attack Detection and Attribution is a superb reference to help you get there.” —Ben Rothke, RSA Conference Security has become a “big data” problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you’ll need to know how to think like a data scientist. In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis. Whether you’re a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.

BUY THE BOOK HERE

140

WOMEN IN SECURITY MAGAZINE

SMART GIRL’S GUIDE TO PRIVACY

CYBERSECURITY LEADERSHIP:

Practical Tips for Staying Safe Online

Powering the Modern Organization 3rd Edition

Author // Violet Blue “The Smart Girl’s Guide to Privacy is a straight-forward how-to for protecting your privacy and undermining the social media settings that want you to share potentially intimate details with the world...I found the book alarmingly handy.” —Bitch Magazine “For girls and women in the technological age, this guide to Internet safety is a must-read. It’s a young woman’s invaluable guide to empowerment, addressing not only the why of keeping strong boundaries but the how.” —Foreword Reviews The whirlwind of social media, online dating, and mobile apps can make life a dream—or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Smart Girl’s Guide to Privacy, Violet Blue shows you how women are targeted online and how to keep yourself safe. Even if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to Privacy help you cut through the confusion and start protecting your online life.

BUY THE BOOK HERE

Author // Mansur Hasib Widely acclaimed and cited by practitioners and scholars alike as the definitive book on cybersecurity leadership and governance. Listed among the best selling cybersecurity books of all time and authored by Multiple Global Award Winner: 2017 People’s Choice Award in Cybersecurity; 2017 Information Governance Expert of the Year; 2017 (ISC)2 Americas ISLA Award for Graduate Cybersecurity Technology Program at UMUC “The book defines cybersecurity ... It also continues to expand on the three key tenets of people, policy and technology. Hasib does well at describing such complex topics as the seven essential functions of a CIO, the challenges that occur when organizations place the CIO as a direct report to the CFO, and why the CIO and CISO must have a mutually supportive relationship. ...” - - excerpt from review by DaMon Ross.

BUY THE BOOK HERE


UNMASKING THE HACKER:

THE RISE OF THE CYBER WOMEN:

THE RISE OF THE CYBER WOMEN:

Demystifying Cybercrime

Volume One: Inspirational stories from women who are taking the cyber security industry by storm

Volume 2: Inspirational stories from the women who are taking the cyber security industry by storm Kindle Edition

Author // Amanda-Jane Turner Do you use computers, smart phones and the internet? If you do, please read this book and help protect yourself from cybercrime.There is no solely technical solution to fight cybercrime and neither is there a solely human solution. That is why everyone who uses technology and the internet need to have at least a basic understanding of what they can do to help protect themselves in cyberspace. The stereotype that cybercrime is committed by mysterious hoodywearing hackers is harmful. It encourages a feeling of hopelessness about how to protect ourselves and our information. How can we fight these mysterious hidden figures? This book provides easy to understand information to demystify cybercrime and make cyber security more understandable and accessible to all. As technology has evolved exponentially since the advent of the Internet, and because each subsequent generation does not know a time without being connected via smart phones, social media and emails, this book also provides a brief history of computing and the Internet, hacking, social engineering and cybercrime.

BUY THE BOOK HERE

Author // Lisa Ventura, Lauren Zink, Goonjeta Malhotra, Liz Banbury, Cheryl Torano, Celine Rowan Pypaert, Annie Jamshed, Lucy McGrother, Dr Semire Yekta, Stephanie Luangraj “The Rise of the Cyber Women” is a compilation of inspiring stories from women in the cyber security industry from all over the world who are pioneers and leading the way in helping to protect the world from the growing cyber threat. Those who are included and featured in this book shared not only their stories but also their hints, tips and advice to women who are looking to pursue a career in cyber security or change their career path into cyber security. Their tenacity and commitment to their careers in the cyber security industry is very impressive indeed. If you are a woman who is looking to make the move into the cyber security industry, you need to read this book. If you feel that you are not good enough for a career in cyber security, you need to read this book. If you suffer from “impostor syndrome” which is holding you back from a career in cyber security, you need to read this book.

BUY THE BOOK HERE

Author // Compiled by Lisa Ventura, Lianne Potter, Andrea Manning, Pooja Agrawalla, Caroline Ndege, Sai Honig, Yatia Hopkins, Vina Ta, Federica Vitale, Gyle dela Cruz Staying safe online has never been more important with cyber-attacks happening to organisations large and small all over the world daily. Yet there is a huge cyber skills gap shortage, with those who do enter the profession tending to be men. Few women pursue careers in cyber security, but those who do are shattering the glass ceiling and contributing to the safety and security of the internet, our critical national infrastructure (CNI) and our day to day lives. Shockingly, the most recent Global Information Security Workforce study by (ISC)2 found that women in the cyber security profession represent only 10% of the workforce. It is clear that much more needs to be done to attract women to enter the cyber security industry and take up STEM careers in general.“The Rise of the Cyber Women: Volume 2” is a compilation of inspiring stories and interviews with women in the cyber security industry who are pioneers and leading the way in helping to protect the world from the growing cyber threat.

BUY THE BOOK HERE

WOMEN IN SECURITY MAGAZINE

141


Save the date

The Australian Women in Security Awards are back for 2021. Join us in-person or via live stream to celebrate our community of Women in Security.

October 13th 5:30-10:30pm MORE INFO


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.