Women In Security Magazine Issue 3

Page 46

Gergana Winzer Industry Director CyberSecurity APAC for Unisys responsibility: because some of the most

I

important problems you will face will not be technology related, they will be interpersonal. The more real we get about who we are, the ’m the Industry Director CyberSecurity APAC at

more we learn how to communicate with

Unisys,and I I report to the global Vice president

others and really understand them. Take into

of Security who is based out of California in the

consideration who your team is and their

US.

commitment!

Unisys is a systems integrator and a technology and services company, so cyber risk has a very

high priority. However, I am not responsible for the security of my organisation but for providing meaningful cybersecurity solutions to our clients. I really enjoy my role, and I would love to have more decision making power in order to deliver the outcomes I know the business wants me to. I however realise that this is a process and I am willing to work hard in order to get there. In my role I get to see the many issues our clients have to deal with on an ongoing basis and be able to keep up with it all in order to be cyber resilient and compliant. Based on my experience, this is how I advise them to deal with those challenges.

Eventually: Every organisation needs to adopt a mindset that acknowledges the growing risk from cyber threats and factors these into its risk assessment. Threat x Vulnerability = Risk. In my role as a cyber professional I see, more than ever, the need to proactively and precisely evaluate threats and vulnerabilities and make appropriate decisions. Being able to calculate the risks in actual dollar value will have a massive impact on the way organisations make decisions on cybersecurity budgets. Unisys has an analytics tool that allows me to predict the impact in dollars of a data breach on my customers and I can see how this type of thinking will elevate us above cyber threats and allow for proactive defence and informed risk mitigation and data based

• Get the basics nonnegotiable: For example, if you can’t always patch find a way to implement other measures and apply them, negotiate internally and make it happen! • Think strategically: Will your strategy be relevant in the next 18 months? If not include a long-term addendum and think long-term impacts. • Communicate, be authentic and take

46

WOMEN IN SECURITY MAGAZINE

decisions. My role is becoming increasingly relevant. I am eager to assist my clients in co-creating solutions that enable them to constantly improve their cybersecurity posture and build further confidence in the measures they are taking. This industry is amazing because it offers so much novelty. I am excited about the new solutions my


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Surviving a crisis - a view from the trenches

6min
pages 120-123

Are you doing enough to protect your organisation’s IT security?

2min
pages 118-119

Take me to cuba

6min
pages 111-113

Whose afraid of Zero Day

6min
pages 114-117

How to embrace the coming technology revolution

4min
pages 108-110

Linking data privacy to security

3min
pages 106-107

transforms cybersecurity

8min
pages 102-105

Back to basics

6min
pages 99-101

AusCERT plenary panel

6min
pages 96-98

Hackers are not who you think they are

2min
pages 91-95

Celebrating information security excellence in 2021

9min
pages 86-89

Factors threatening effective partnerships in crisis situations

2min
page 90

AWSN returning to in-person events around Australia

3min
pages 84-85

Building relationships in the security and risk suite and why it matters

4min
pages 80-81

fighting for women in STEM

8min
pages 76-79

Ten top tips to secure your website

3min
pages 74-75

How SiteMinder’s product and technology teams stayed motivated and innovative during the pandemic, while servicing the traditional hotel industry

5min
pages 72-73

Top 5 digital parenting tips for parents with teens

2min
pages 64-65

Lisa Jiggetts

5min
pages 54-57

Could inclusivity expand the cybersecurity talent pool in australia?

3min
pages 60-61

A Tuesday in the life of a Regional Technical Support Manager

5min
pages 62-63

How to make a midcareer move into cybersecurity

3min
pages 58-59

Gergana Winzer

7min
pages 46-49

Noushin Shabab

4min
pages 52-53

Christina Keing

4min
pages 50-51

Dr Lesley Seebeck

6min
pages 40-41

Anna Liebel

4min
pages 32-33

Jo Stewart-Rattray

5min
pages 34-36

Daniella Traino

6min
pages 30-31

Giulia Traverso

3min
page 37

Shelly Mills

5min
pages 38-39

How to create a culture of belonging and why it matters

8min
pages 18-21

Beware of ransomware

2min
pages 16-17

more diverse workforces

4min
pages 12-15
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.