04
AIN T E R
P82
P
T
EVELO
A
FINDING CYBER TALENT- WHAT’S IN THE SECRET SAUCE?
SOLVING THE PIPELINE PROBLEM
-D
C A T R T -
SEPTEMBER • OCTOBER
THRIVING IN A POST-PANDEMIC FLEXIBLE WORKING ENVIRONMENT P60
P46
MAKE YOUR COMPANY A TALENT MAGNET TO ATTRACT THE RIGHT METTLE P18
STUDENT IN SECURITY SPOTLIGHT P99
W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M
FROM THE PUBLISHER Past is prologue. Building a more equal future is up to us.
W
ell yes it needs to be
anxiety about remote working, financial pressure,
addressed, and where better
increasing responsibilities such as home learning,
to do so than my regular
and general anxiety about the future – all while
magazine intro – a place
physically contained within the confines of a home.
where I can poke the bear and will always be forgiven!
hasn’t been enough to extract many people from
So the question I pose to you is: Can we leave the
the stresses of the workplace – with many workers
inequality of the pre-COVID world behind us for
reporting cyber bullying continues to extend from the
good?
workplace to the home.
Pick up just about any piece of research discussing
You don’t have to see your coworkers face-to-face,
the impact of Covid-19 on gender equality, and you’ll
after all, to bully and harass them – and many people
hear that we appear to be going backwards again
may find it easier because the physical distance often
– just when we had started making headway.
makes abusers more disinhibited.
There are many reasons for this: even with the whole
This issue, we are looking at issues such as OH&S –
family working from home, women are still taking on
which has, thanks to the pandemic, been extended
the largest share of care and unpaid household work.
to workers’ own homes. This puts new expectations
Social-distancing measures have had a large impact on industries with high female employment, in industries skewed heavily towards women at risk of job losses or reductions in working hours. If we’re not able to get gender equality right in lockdown, then, is there hope for getting gender equality in the new – and hopefully better – normal? This new normal must offer men and women equal opportunities to remote work; find new ways to overcome work/family tensions; and address issues such as occupational health and safety, domestic violence, and health and wellbeing – all of which have suffered during the pandemic. Teleworking is at least partly to blame, since cramped living situations have forced many people to deal with
2
Even the seeming distance of remote working
WOMEN IN SECURITY MAGAZINE
on employers to ensure that they build and maintain diverse, equal and harassment-free workplaces – even though so much everyday collaboration is taking place online, in private Zoom and Teams meetings where supervisors often aren’t present. It doesn’t matter what city, state, or country you are reading this from. COVID-19 has shown us all that strong resilient leadership, and a continued dialogue with all parties concerned, are crucial to ensure that decisions made are inclusive – and effective. Ensuring diversity within that leadership is equally important – although the statistics suggest that we still have a way to go on that count. The COVID-19 task force, for example, is comprised of just 25% women and their absence from top-level decision-making positions was obvious.
Abigail Swabey
Sadly, this is in line with overall trends – with women
Employers should consider these and other factors
still comprising just 28% of managers and leaders.
when revisiting workforce recruitment and retention
A recent review found just 20% of healthcare
strategies that have been dramatically altered by
organisations had achieved gender parity on their
the pandemic. Many employees, shut out of careers
boards, with men still outnumbering women in
they have dedicated their whole lives to, may be ripe
positions of influence in most organisations. Things
for luring into cybersecurity – but we need to make
are even worse in high-level roles, with women
sure we are constantly offering job retraining
accounting for just 25% of Parliamentarians and 10%
or “upskilling” to prepare them for a applying their
of heads of state.
talents in the digitized and automated post-pandemic
Those decision-makers are shaping the post-COVID
future.
response in Australia and around the world – so
There is little about our daily lives that the pandemic
after the pandemic, it is incumbent that they avoid
has not changed – but it is up to us to change our
falling into the old traps that perpetuated such glaring
lives, and the lives of those around us, for the better.
gender inequality before the pandemic.
Let’s stand up and choose to challenge inequality, and
Some businesses have already managed to break free
make it a thing of the past – if not for you, then for
of the shackles of inequality, while others are trying
the future generations that are itching to escape from
hard to do so. Yet others are, sadly, still all talk and no
lockdown and look forward to a better, brighter future.
action. Previous issues of Women in Security Magazine have explored the reasons for this – and possible solutions for it – from many angles. As we have seen time and time again, the solutions are there for the taking, but cultural change is hard and takes time. Thankfully, the disruption of our current situation
I’m going to do everything I can to support this mission. Will you join me? #choosetochallenge
Abigail Swabey
means we all have time to consider how we
PUBLISHER, Owner & CEO of Source2Create
can contribute to making our workplaces more
aby@source2create.com.au
welcoming, and more equal. Think about how you can better support the women you work with or live with; to watch out for signs of domestic violence or other tragic repercussions of challenging new living situations; demand equal pay for equal work; and how you can support female-led initiatives delivering on the mission of gender equality.
CONTENTS
2
CAREER PERSPECTIVES
PUBLISHER’S LETTER
Why I plan to get more women into the industry— by leaving it
42
How to get an entry-level cybersecurity job in 2021
HOW TO MAKE RECRUITMENT MORE EQUAL
INDUSTRY PERSPECTIVES
FEATURE Towards a more
Five steps to accelerating consumer
respectful cybersecurity community
12
Pwc australia gets cyber partners
pandemic 58 working environment
22
60
Pipelines 64
Finding cyber talent:
Owning the unknown: studying and
what’s in the secret sauce?
security and data use trust during a Thriving in a post-pandemic flexible
four new female
08
50
working in the field of cybersecurity
46
and software engineering
66
Taking fearless secure development education to the world
70
I got 99 problems but a vuln ain’ t one 74 Why technical proficiency won’t take you to the top in today’s world
18 MAKE YOUR COMPANY A TALENT MAGNET TO ATTRACT THE RIGHT METTLE
Narelle Devine
28
Helen Sultana
30
Megan Haas
32
Carol Chris
34
Christie Wilson
36
WHAT’S HER JOURNEY?
76
Addressing workplace culture in the cybersecurity sector
78
Startup or large corporation?
80
How companies can keep women in cyber engaged and motivated in 2021 86
120 Olivia & Jack get a Gamestation
SEPTEMBER • OCTOBER 2021
TECHNOLOGY PERSPECTIVES In an orchestra the whole is greater than
SOLVING THE PIPELINE PROBLEM
the sum of the parts
FOUNDER & EDITOR
94
Abigail Swabey
Ransomware is rife how will we win?
ADVERTISING
96
Abigail Swabey Charlie-Mae Baker
82
Vasudha Arora JOURNALISTS David Braue Stuart Corner
COLUMN SEO poisoning
SUB-EDITOR Stuart Corner
16
Setting boundaries on teen’s device use
DESIGNER 54
Jihee Park
step one - be prepared
90
Women in Security Magazine is published by Source2Create
The Big Bad Wolf
93
ABN 25 638 094 863
Surviving a breach:
www.womeninsecuritymagazine.com contact@source2create.com.au
OFF THE SHELF
Victoria Cheng
103
Jacynta Grigson
104
Aarati Pradhananga
107
Kavika Singhal
108
Karen Hobson
109
Shahnaz Ali
110
Jocasta Norman
111
Abby Zhang
114
Emma Seaman
116
Tiana Inman
117
Caitlin Sauza
118
TURN IT UP
126
©Copyright 2021 Source2Create. All rights reserved. Reproduction in whole or part in any form or medium without express written permission of Source2Create is prohibited.
04
SEPTEMBER
SURFING THE NET
136
-R
FINDING CYBER TALENTWH IN TH E SE AT ’S SA UC E? CR ET
P46
ETAIN
• OCTOBE R
SOLVING THE PIP EL IN E PR OB LE M
EVEL
113
AWSN is the official partner of Women in Security Magazine
-D
Maeesha Lohani
130
ATTRACT
102
RACT
Pooja Shankar
Source2Create Pty Ltd is the publisher of this magazine and its website (www.womeninsecuritymagazine.com).
TT
100
A
Kathy Nguyen
OP
STUDENT IN SECURITY SPOTLIGHT
THRIVING IN A POST PA NDEMIC FL EX IBL E
P82
SUBSCRIBE TO OUR MAGAZINE Never miss an edition! Subscribe to the magazine today for exclusive updates on upcoming events and future issues, along with bonus content
SUBSCRIBE NOW
04
RACT T T
P
A
P46
P82
EVELO
FINDING CYBER TALENT- WHAT’S IN THE SECRET SAUCE?
SOLVING THE PIPELINE PROBLEM
-D
AIN T E R
ATTRACT
SEPTEMBER • OCTOBER
THRIVING IN A POST PANDEMIC FLEXIBLE WORKING ENVIRONMENT P60
Connecting - Supporting - Inspiring
AS A FORMAL NETWORK MEMBER, YOUR CONTRIBUTION ENABLES US TO BUILD A STRONGER FUTURE
With an affordable annual fee, AWSN members will have access to discounts on programs and industry events, the membership Slack space, post or share job opportunities, and receive our monthly and any special edition newsletters.
Memberships are now a 12-month cycle Corporate packages available Learn more at www.awsn.org.au/members/join/
HOW TO MAKE RECRUITMENT MORE EQUAL by David Braue
DOES MORE DATA MAKE RECRUITMENT MORE EQUAL? With AI stumbling and HR tech currently CIOs’ lowest priority, progress is slow
A
mazon’s early failures testing artificial
characteristics that made for a
intelligence (AI) to automatically
good Amazon employee. The
rank job applicants have become
problem: the underlying gender
a cautionary tale about blindly
imbalance in Amazon’s workforce
entrusting AI with shaping our workforce. Yet as CIOs all but
ignore HR tech and diversity leaders worry that AI amplifies gender inequality rather than fixing it, will we ever be able to tap data to help build more diverse companies? There was early hope, of course, that increasingly automated HR administrative systems would provide a goldmine of employee-related data for AI engines such as Amazon’s experiment – which trained an AI engine to automatically evaluate and rank dozens of
8
meant most of the CVs fed into the AI were males – causing the algorithm to conclude that being male was highly correlated with being a better worker. ‘Black box’ AI solutions have proven problematic in situations where probity and gender equality are important, since they tend to amplify gender bias in the data they’ve been trained on. Companies with existing gender imbalances must therefore avoid relying on their existing HR data – or intentionally
job applicants’ CVs.
compensate for it – to create real change.
By training the AI on the CVs of existing workers,
While CVs can be scraped to have gender-specific
the theory went, the AI would be able to identify the
names removed, other attributes – such as hobbies,
WOMEN IN SECURITY MAGAZINE
F E AT U R E
sports, previous roles and the like – often have implicit gender affiliations that skew the AI model’s results in ways that aren’t always obvious. “There’s a real risk with relying on technology that just scrapes in anything it can to figure out whether you’re a fit,” Barb Hyman, CEO of interview automation firm PredictiveHire, said during a Melbourne Business School webinar.
“ Companies need to double down to ensure they have authentic substance and measurable impact, not just signalling on social media.... Critical to this is helping them structure the way they hire so that they are hitting the numbers that matter in recruitment.”
“It’s very easy to amplify an existing gender bias using those attributes, even if it’s blind,” she said, calling CV data “pretty gameable” and video interviews showing “a big risk of being biased.” The importance of explainability – the ability to better monitor and control how AI algorithms are reaching their results – has become critical for the technology to be used in recruitment, where algorithms can have life-changing consequences for everyday people, and for the cultural composition of the company. “Explainability is critical in a world where a lot of AI is governed by deep learning modules,” Hyman said. “As a candidate, you don’t really know what [AI is] drawing on to make a decision about you.... and we’ve consciously chosen not to use those because you can’t explain the outcome.” Five years after Amazon’s experiments, a recent Melbourne University study highlighted the persistence of this issue, with a recruitment panel blinded to the gender of particular applicants for data analyst, finance officer, and recruitment officer
WOMEN IN SECURITY MAGAZINE
9
positions – jobs that are male-skewed, gender-equal,
millions of dollars pursuing HR efficiency without
and female-skewed, respectively.
fulfilling the promises made to the business....
The panel still picked males as being most qualified
Progress has not been made where it counts.”
for all three roles, admitting that they are largely
This issue has been exacerbated during the COVID-19
looking for signs of relevant experience, education,
pandemic, where the rapid and dramatic workforce
and keywords that testify to their skills – but did not
changes of the past 18 months pushed HR into a
factor in statements about explanatory factors such
period of rapid change.
as maternity leave.
Gartner last year advised HR leaders to embrace a
When an AI algorithm was coded to the same
focused pandemic management plan to compensate,
process, it came to the same conclusion – with men
but recently reported that even the best planning
evaluated as having more relevant experience but
hasn’t avoided significant workforce challenges.
women better at matching particular keywords.
In the context of disruption so dramatic that three-
The results “mean there is something distinct about
quarters of HR leaders say their employees are
men’s resumes that made our panel rank them higher,
hesitant to come back to the office, once-ennobled
beyond experience, qualification and education,” said
goals like gender equality can easily take a back seat
study author Associate Professor Leah Ruppanner,
to fighting for operational continuity.
co-director of The Policy Lab at the University of Melbourne, warning that the AI algorithm “reinforces and amplifies unconscious gender bias in recruiting.”
Yet now is the time to double down on core values, Deloitte noted in its latest report advising the prioritisation of the worker-employer relationship
“This forms the most alarming dimension of gender
during the pandemic: “to survive when this
bias, as we are not capturing what gives men the
relationship is founded on purpose, an organisation
edge in these positions.”
needs to live and breathe purpose,” the firm’s analysts
“The algorithm isn’t thinking about experience, it’s just
note.
finding associations [and] you have to say to it ‘don’t’
Yet while two-thirds of the executives Deloitte
penalise women for parental leave’. It has to be coded
surveyed said they would evolve their organisational
in.”
metrics in coming years to address issues like societal goals and diversity and inclusion (D&I), fully
PURPOSE IN A TIME OF DISRUPTION
80% said their leadership still wasn’t ready for this
AI experts are working across every business and
change.
technology discipline to improve explainability,
That was a problem for every type of company –
figuring out how to teach AI to skew itself towards policy-driven outcomes that may not necessarily be reflected in existing data. Yet HR organisations continue to struggle to find a clear, effective and explainable way to apply AI in a way that matches corporate gender-equality objectives. Yet AI isn’t the culprit here, so much as a canary highlighting the ongoing cultural problems that created gender imbalances in the first place. “The promise of HR transformation has not played out,” Dave Weisbeck, chief strategy officer with workforce-analytics firm Visier, recently wrote. “Instead, we’ve seen organisations spending multiple
10
WOMEN IN SECURITY MAGAZINE
which, Deloitte advised, must “integrate purpose into all that it is and everything it does... make sure purpose is reflected in the organisation’s core talent programs to make sure its values come clearly through in the way workers are treated.”
CHANGE BY THE NUMBERS Yet even if business leaders do push HR staffers to improve workforce diversity using data-driven analytics, those efforts are likely to be hamstrung by competing priorities. HR was ranked dead last in a recent survey of 500 CIOs’ investment priorities by digital-transformation firm Genpact, which found that 76% of Australian
F E AT U R E
CIOs believe their company is unprepared for another
and allowing companies to tap new sources of skilled
major business disruption.
staff that have become more accessible in today’s
Just 22% of CIOs were ranked as ‘pilots’ driving
remote-work environment.
transformation strategically across core business
The pandemic “had a disproportionate impact on
functions, Genpact found – suggesting that no matter
underrepresented groups in the workplace,” said
how much they recognise data to be important to HR
Tom Dyson, head of product at recruitment-software
reinvention, CIOs ultimately defer to line-of-business
developed JobAdder, “and you have a situation
leaders who have more immediate priorities than
that has forced companies to re-evaluate their D&I
teaching AI to be less discriminatory.
agenda.” “Companies need to double down to ensure they have authentic substance and
“Explainability is critical in a world where a lot of AI is governed by deep learning module. As a candidate, you don’t really know what [AI is ] drawing on to make a decision about you.... “
measurable impact, not just signalling on social media.... Critical to this is helping them structure the way they hire so that they are hitting the numbers that matter in recruitment.” As a disruptive platform for workforce recruitment, Dyson said, JobAdder has built-in features such as a D&I dashboard to help companies establish hiring processes that “match the desired goals they have as a business of which the leading companies
“Organisations have often been guilty of looking in the wrong place for the wrong people with the wrong skills,” David Gregory, senior director and analyst with Gartner, said during a recent webinar on the outlook
have D&I metrics baked into their DNA.” Ultimately, the evolution of innovative recruitment tools will help companies build and maintain momentum for change. PredictiveHire, for one, has
for security staff.
targeted the issue of AI bias by ensuring it does
“Patchy” success rates in traditional recruitment
create bias – then using the third-party Namsor
processes, exacerbated by “the demand for instant results” as leaders react rather than plan longterm, had mired HR tech in organisational inertia exacerbated by a disconnect with other siloed business functions. “All of our data suggests that this is a trend that will continue,” Gregory added. “There are underlying problems that are holding organisations back from getting the right people. We rely on the same recruitment process, even though this is never a guarantee that we end up with the right candidate.” With AI far from the panacea some had hoped, the right solution will seemingly come from a combination of new technologies and an overhaul of old policies, hopefully breaking the cycle of sameness
not collect information about candidates that could platform, which uses candidate names to determine gender and ethnicity, to ensure the AI’s results are appropriately gender-diverse. By building continual checking into the process, says Hyman, AI can be used to support human-driven recruitment rather than replacing it – potentially identifying the human bias that has allowed D&I imbalances to fester in the past. “It’s very hard to sit around a table with your colleagues and debate whether a person should be hired in the absence of any data,” she said. “And if AI is saying that a person is a really strong match and no one in the team is recognising that, it invokes a conversation about whether we are missing something – or we are biased in our own decisions.”
WOMEN IN SECURITY MAGAZINE
11
TOWARDS A MORE RESPECTFUL CYBERSECURITY COMMUNITY by Stuart Corner
A new initiative has been formed in the UK to combat all forms of harassment in the industry
H
ave you, as a cybersecurity
INDUSTRY PLEDGES SOUGHT
professional, suffered harassment
Its main aim, says cofounder Marc Avery, is to elicit
either online or in person, through your work?
that they will counter harassment and be transparent
If so, you are not alone. It’s
about their processes for reporting and dealing with
surprisingly common. A recent
incidents.
survey by research firm Sapio, which polled 302 cybersecurity professionals found 32 percent had been harassed online, 35 percent in person. And there was little difference in percentages between those identifying as male, female or non-binary. Cybersecurity professionals aren’t unique in this respect, but now, they do have a new initiative dedicated to addressing the issue: Respect in Security. It’s been set up by a handful of cybersecurity specialists in the UK to fight harassment of all kinds,
“That pledge compels organisations to publicly commit that they will, in the event of any report to them about one of their employees being involved in this kind of unacceptable behaviour, take action and support that individual.” Avery is also cofounder of Cyber House Party, a UK based not-for-profit set up in 2020 to create a community for cybersecurity professionals and raise money for charity.
in person and online.
He adds: “Organisations should be doing this as a
Respect in Security is not a counselling service or a
internal policies for harassment, and good behaviour
legal channel through which to file complaints against an individual or organisation. The founders say it will be a resource guiding individuals to organisations that provide such services.
12
commitments from organisations in the industry
WOMEN IN SECURITY MAGAZINE
de facto standard. We all know that companies have and ethics. But actually, are these transparent and published? Do they make it known that anybody can
F E AT U R E
whistle-blow or report one of their employees for
Avery says the genesis of Respect in Security was a
misbehaviour?”
Cyber House Party event in April 2021 that included
He says more than 50 organisations have already signed the pledge, and there are more in the pipeline.
a panel session on online harassment, at which Forte revealed her own experience of harassment.
The current list also includes global players in
Describing this in a blog post, cofounder Rik Ferguson
cybersecurity, such as Trend Micro and BT and Avery
— Vice President of Security Research at Trend Micro
expects other larger companies to respond over the
— said: “It wasn’t until I listened to Lisa Forte speaking
coming months.
on a panel at a Cyber House Party event about just
“We have some really big organisations, and some really small organisations across different geographic locations, including Canada, the US and Australia. The power of social media and online activity has really enabled us to get a big reach.
some of the abuse to which she has been subjected that the penny really dropped. … Afterwards, I chatted with Marc Avery. … We had both been equally taken aback and decided that we had to do something.” Following that realisation the trio got together to talk about the issues and develop a suitable approach
ONLINE COMMUNITIES ENCOURAGING HARASSMENT
to raise awareness. “As we started we heard more
While there’s no hard evidence that cyber has a poorer
across various different platforms, which was quite
track record on harassment than any other industry, Respect in Security cofounder Lisa Forte — also cofounder of cybersecurity training and consultancy Red Goat Cyber — suggests the industry’s environment is conducive to harassment. “We are an industry that has a very heavy online presence: we communicate extensively remotely. Often people have never met in person and they are
and more stories affecting both females and males surprising to us,” Avery says. “It’s something we feel isn’t talked about enough in the industry. And we’re hoping to change that.”
CURBING THE TWITTER STORMS Forte says one of the group’s first objectives is to mitigate the flood of postings that are often precipitated on social media by online harassment.
talking and befriending each other. I don’t think a
“We want to provide a way for victims to hold
lot of other industries have that same sort of global
people accountable, or to take action against bad
online community.”
behaviour, without causing a mass pile-on on Twitter,
WOMEN IN SECURITY MAGAZINE
13
or on another platform. Often when someone does
harassment. And we also don’t want it to be a sort
something they shouldn’t they are called out on
of women’s protection group. It’s for everybody:
Twitter, and then loads of people come to the victim’s
harassment from anybody towards anybody is
aid, pile in with abuse towards the abuser, and it
completely unacceptable.”
spirals.
However, Respect in Security has no plans to be
“We were very clear from the start that we wanted
an action group, trying to engineer some kind of
to provide a way for people to do this the right way.
retribution for offenders.
That might be through lawyers, it might be through the police, it might be through the employer. It isn’t through Twitter.”
“We know from experience, doing that is troublesome, and not very easy,” says Avery. What we can do as an organisation is to talk about it, highlight some of
With COVID-19 limiting face-to-face communications,
the issues we’ve heard about anonymously and then
things are getting worse. “In the last year, both the
encourage organisations to step up to the pledge.”
“We are an industry that has a very heavy online presence: we communicate extensively remotely. Often people have never met in person and they are talking and befriending each other. I don’t think a lot of other industries have that same sort of global online community.”
A HARASSMENT SUPPORT RESOURCE Forte says: “The website will have a wealth of resources to signpost people to the correct place to go and seek some help and advice. We’re not looking to reinvent the wheel. There are many charities that have done a lot of this legwork, and with some fabulous psychologists and others involved.” One of Respect in Security’s partners and organisations
amount and the severity has increased exponentially,” says Forte. “I think there’s a sentiment in the industry that it’s become almost intolerable on certain platforms. I have taken a break from Twitter as a result of observing some of the stuff that’s going on. I know a lot of other people have felt the need to do the same.” She adds: “I’ve had many people message me, mainly women, but not exclusively, who have said, ‘Thank you for starting this because I was genuinely considering leaving the industry’.” While sexual harassment of women might have the highest profile, Forte says Respect in Security will guide anyone who has been the victim of any kind of harassment to get the right support. “We don’t want this to be specifically about sexual
14
WOMEN IN SECURITY MAGAZINE
it guides victims of harassment to, is The Cyber Helpline, a UK charity that helps victims of online harassment, stalking and other kinds of online criminal activity. Forte says: “We plan to have guidance on signposting people to the correct way of doing things, including information that has been put together by partner organisations on things like collecting evidence and making sure that you can prove what has happened. “If a company has signed the pledge, then this will be published on their website, including information on where you go to report a member of staff for something you think they shouldn’t have done.” She says victims of harassment are not the only ones needing support. “The perpetrator may have been going through something horrific, and this could have been why their behaviour manifested the way it did.
F E AT U R E
We’ve seen people who are going through horrible divorces and other things who have lashed out very nastily on social media.”
A WORK IN PROGRESS Respect in Security is presently relying on the voluntary contributions of its founders and others, and is still taking shape. “For the first few months, we are planning to facilitate some sessions to listen and learn,” says Avery. “We may not get everything right the first time. There are some conflicting views that we’re seeing already about different ways to tackle these things. And there may never be a right or wrong answer.” The future direction of the initiative is still fluid, says Avery. “In the future we may change our approach and start to provide some services. We’re not pre-empting, whether or not that’s going to happen.” The initiative is not limiting its ambitions to the UK. “Our aim is to have representatives in other countries who can replicate what we have done in the UK and apply it to their jurisdiction,” says Forte. “But there’s a sticking point that’s a little bit difficult. Law enforcement is different, so we need a local perspective.” The founders plan to set up an advisory board to help it develop its future direction, to undertake research into harassment issues and produce an annual report on its findings. “We have had an overwhelmingly positive response since launch and it seems that people were almost waiting for an initiative like this to come along”, said Avery. “It’s something that everybody jumped on, because they feel it’s something that’s really pertinent. Maybe it wasn’t being talked about enough. Now is a good opportunity to raise awareness.” www.linkedin.com/company/respect-in-security
twitter.com/respectinsec www.respectinsecurity.org
WOMEN IN SECURITY MAGAZINE
15
AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist
C O L U M N
SEO poisoning Cybercrime is big business, thanks to technical advancement and interconnectivity creating more opportunities for cybercriminals. This regular column will explore various aspects of cybercrime in an easy to understand manner, to help everyone become more cyber safe. Criminals do their research, know how to optimise
infected page. As soon as they click on that link the
search engine results, and will use any trending
infected page will drop malware onto their system in
topic available to ensure people fall victim to
what is known as a drive by download.
their campaigns. One of their baits exploits people’s interest in employee pay and conditions and enterprise bargaining. Criminals will either compromise a legitimate site or create their own,
WHAT CAN WE DO TO PROTECT OURSELVES? • Before you click a link in a search result,
and use search engine optimisation (SEO) poisoning
make sure it will take you to the site you were
techniques to ensure their pages are at the top of
intending to access.
search engine results for queries on these topics. SEO poisoning is where the compromised or malicious sites use keywords associated with trending topics so their pages are seen first in searches for information on those topics. One current trending topic is enterprise bargaining. Criminals are infecting unpatched WordPress sites related to enterprise bargaining with malware droppers, and then ensure the infected pages reach the top of search results. Anyone using ‘enterprise bargaining’ in a search will be shown a link to the
• Keep your browser up to date. • Take care when downloading files from websites. • Keep your operating system and software patched. • Use only official legitimate sources to download software. • Use reputable and up-to-date anti-virus software. If you have been impacted by cybercrime, in Australia you can report this via www.cyber.gov.au/acsc/ report. In other countries, report it to your local police or through the relevant cybercrime reporting mechanism. SEO poisoning is big business – stay safe. www.demystifycyber.com.au/
Easy Reliable Resourceful No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY!
charlie@source2create.com.au
aby@source2create.com.au
www.source2create.com.au
MAKE YOUR COMPANY A TALENT MAGNET TO ATTRACT THE RIGHT METTLE by David Braue
It’s all about culture – but will yours make them want to stay?
E
very company tries to paint itself as a
nightmare scenario that not only threatens
paragon of equality but few would be
immediate consequences, but can taint the
ready to handle the firestorm created
company’s ability to attract the best and
at video-game giant Activision Blizzard
brightest in its industry.
– whose executives recently faced a mass staff walkout after longstanding
accusations of a ‘frat boy’ culture where harassment and discrimination against women were all in a day’s work.
With cybersecurity expertise in high demand and skilled staff able to basically name their terms, management in all kinds of industries face similar issues as they work
The day-long strike, which saw hundreds of the
to close longstanding cybersecurity skills gaps by
company’s 9500 employees walk off the job and led
building a corporate culture that can serve as a
to a lawsuit by California state authorities, echoed a
magnet to attract top cybersecurity expertise of all
similar walkout at rival Riot Games two years earlier
genders.
that was also intended to shine a light on endemic Duty studio Activision Blizzard, just 1 in 5 employees
COME FOR THE TECH, STAY FOR THE CULTURE
is female.
A recent survey by recruitment firm Contino, entitled
For corporate officers, the public airing of the
The Voice of Talent 2021, offered some guidance as
discrimination across an industry where, as at Call of
company’s dirty laundry – including allegations
18
to what such a corporate culture should include –
that women are discriminated against, blocked
and much of it will come as no surprise.
from promotions, paid less and fired faster – is a
The traits that make a company the most appealing
WOMEN IN SECURITY MAGAZINE
F E AT U R E
get offered new roles on a weekly basis,” she said, “it’s important that your employees are happy and you are not giving them a reason to look elsewhere.” Interestingly, the presence of a progressive diversity and inclusion (D&I) program was ranked as the tenth highest priority for workers, out of ten. In the context of Activision Blizzard’s employee-relations disaster, this finding suggests that workers don’t come into a job looking for a diverse and inclusive environment – but if it’s not there, they simply won’t stand for it.
“People do their best work at companies when they are supported and they feel that they can be themselves. The lack of psychological safety that comes from being a marginalised person in a monoculture is a powerful reason to look for a more supportive work environment.” That can create real problems for employers counting on their company culture to attract skilled cybersecurity staff – particularly from underrepresented groups, and even more particularly given the exacerbation of the talent drought by the COVID-19 pandemic. “With the Australian borders locked down minimising inbound tech talent, there is a finite talent pool,” to work for, the 178 Australian respondents said, include the opportunity to work with modern
Contino APAC managing director Craig Howe said as the figures were released.
technology and practices, a competitive salary
“Compounding the situation, we have seen a
package, great work flexibility, a great manager or
significant increase in large enterprises embarking
leadership team, and a great company culture.
on digital transformation projects to increase
“For me personally, a good company culture is a culture where people can innovate, where the norm
velocity, agility and cost reduction… [which has] made recruiting the right tech talent all the more difficult.”
can be challenged and leaders are not afraid of taking
As with every magnet, however, for every positive
the path less travelled,” said Dr Denis Bauer, head of
aspect of company culture there is an equal and
cloud computing in bioinformatics with CSIRO.
opposite repelling force that will, if present, push them
“In a competitive talent market where technologists
away – and they have nothing to do with the tech.
WOMEN IN SECURITY MAGAZINE
19
Having a bad manager or leadership team was
the COVID-19 pandemic to ensure that staff were
the number-one reason for leaving a company,
taking time for themselves.
with others citing company politics, a lack of work flexibility, and a lack of career progression as key issues.
thing of the past, Mayne said, because it has pushed staff to organise the rest of their weeks far more
Interestingly, men were more likely to leave due to
efficiently: meetings get done on Mondays through
a lack of work flexibility than women, who were
Thursdays, leaving Friday mornings for mopping up
more likely to cite a lack of career development
any additional administration time.
opportunities as a key issue. Significantly, the survey also broke out the priorities of non-binary respondents – who ranked the presence of a D&I program as their top attracting factor and were far more likely to leave a job if the company lacked diversity.
That sort of positive attitude is not only beneficial for employees, but can help a company stand out in the minds of specialised cybersecurity recruiters who often serve as front-line filters – and may choose to not work with companies that don’t have cultures where they would feel comfortable placing new
“Diverse teams tend to have diverse opinions and
recruits.
this makes for a culture where people can challenge
“There are definitely companies that I know have a
each other respectfully,” said Dawn Collett, a DevOps engineer with Dubber Corporation. “People do their best work at companies when they are supported and they feel that they can be themselves. The lack of psychological safety that comes from being a marginalised person in a monoculture is a powerful reason to look for a more supportive work environment.”
bad culture,” said Mayne, who flagged two key areas where companies should focus to make sure they end up on the right end of the cultural lens. Diversity and inclusion, she explained, is a major element of a good corporate culture, as is a focus on mental health – especially within cyber, where chronically high-stress jobs are well-known for exacting a significant toll on many workers.
BUT WHAT GOES INTO GOOD CULTURE?
High stress also contributes to high attrition –
So, employees value a good company culture and
meaning that proactively reducing stress can help
will recoil from management that makes it bad. This will surprise few, and offers little guidance about what specific things companies can do to make their
an employer hold onto the staff for a longer while, at the same time, saving themselves the headache of having to keep finding and hiring new cybersecurity
cultures more appealing to women, in particular, and
experts as often.
everyone in general.
Determining what aspects of company culture will
“People are more and more valuing the culture and
increase employee stickiness is also an individual
the level of care that employers provide their teams,”
matter: some “really see the value in certifications,”
Rachael Mayne, senior associate for cybersecurity
Mayne explained, “while for others it’s being able to
and GRC with recruitment firm u&u, told WiS
go from extremes” such as building pen-testing skills
Magazine. “It’s not even that there’s one right or wrong
one month, then moving into GRC or being a cloud-
way of doing things; people appreciate anything. As
security architect.
long as you are trying to do something, it goes quite a long way.”
20
He’s likely to continue the policy after lockdowns are a
“That’s just the nature of the people in cybersecurity,” she said. “They are very curious people who like the
One recent client, for example, had seen productivity
challenge, and they want to further their knowledge
“go through the roof” after giving all employees Friday
and experience – and I think that’s a huge selling
afternoons off – an initiative he implemented during
point for them.”
WOMEN IN SECURITY MAGAZINE
F E AT U R E
Rank
1
Why employees join a company… Work with modern technology and practices (public cloud, DevOps, agile, ML/AI)
2
Competitive salary package
3
Great work flexibility
4 5 6 7
8 9 10
Great manager or leadership team
Great company culture
Great career progression opportunities
And why they leave
Bad manager or leadership team
Company politics (bad company culture)
No work flexibility
Lack of career progression
Outdated tech stacks and delivery models
The salary package
Passionate about the direction
Disagree with the direction of
of the company and the
the company and the projects
projects you are working on
that you are working on
Talented team – the company is known for hiring great people
Not passionate about the team members you work with
Dedicated time and budget for
Lack of diversity in the
learning and development
company
A progressive diversity and
Lack of learning and
inclusion program
development time and budget
Source: Contino Voice of Work 2021
WOMEN IN SECURITY MAGAZINE
21
PWC AUSTRALIA GETS FOUR NEW FEMALE CYBER PARTNERS by Stuart Corner
F
or Australian women aspiring to a
We want to get to 40 percent of each over the coming
career in cybersecurity, role models are
years, and then 20 percent of the right mix across
important, and there are four new ones
diverse groups.”
in the upper echelons of PwC Australia’s Cybersecurity and Digital Trust practice. In July PwC appointed six new partners
in its mid-year partner intake. Four of the six are women; two, Mary Attard and Philippa Cogswell, are promotions. Pip Wyrdeman and Richa Arora are external hires.
and Digital Trust practice, Walsh says, creates role models for women in the lower ranks. “There’s a lot of stereotypes that go with this work. Having diversity paints a picture that there is a wide range of skills that make you suitable for the cyber environment. And greater gender diversity, particularly at the
Their appointments reflect PwC Australia’s policy
partner level, says this is a career women should be
on gender diversity. Head of People and Culture,
thinking about.
Catherine Walsh says the firm has already achieved overall gender parity, and has a goal to achieve this at partner level.
“Having those leaders is vital. Women need to see they can come with passion and an interest, and learn when they get here, and have an opportunity to work
“We have 32 percent women at the partner level,
with a broad range of people. If there is a challenge or
which we’re really proud of. It compares well to many
an experience they’re having, they can go and talk to
other professional services firms, as well as many
another woman about it.”
corporates, she says. “But there’s always more to do.
22
More women at senior levels of the Cybersecurity
WOMEN IN SECURITY MAGAZINE
F E AT U R E
BUSINESS SKILLS NEEDED IN CYBER
from a female leadership perspective: unconscious
For the Cybersecurity and Digital Trust practice, Walsh
bias, negotiating pay, connecting with other women
says business skills are needed as much as cyber
who have gone through similar career paths and
skills.
sharing their career stories.”
“Deep technical skill is important for some roles,
PwC is now looking to expand the program beyond
but people who bring critical thinking and great commercial experience across a broad range of areas can be really useful in cyber. Great leadership
its own staff. “We’re focussing on how we can partner with universities to share career stories with other girls that might be considering a career in cyber and
is important: good, clear and critical thinking, critical
technology,” Attard says.
stakeholder management, and being able to bring the
“And we’re also looking at how to network with
right team together to resolve and respond to issues.”
our clients: sharing career stories and creating a
COUNTERING GENDER BIAS
community of women to connect, find new jobs, the next career opportunity, like-minded individuals and
PwC also has a program that aims to counter bias or
someone to mentor.”
discrimination against women in the workplace: its
The program presently holds bimonthly internal
Inclusive Leadership program, being rolled out across the firm.
meetings but the plan is to include clients and to move to quarterly meetings. PwC also plans to extend
“It seeks to make people aware of those unconscious
activities to the wider community. “We are looking to
biases, which we all talk about,” Walsh says. “But
launch a number of additional programs, include a
more importantly, it’s in the art of the conversation:
careers fair later in the year, and we’ll connect with
how people work, their background and the skills
partners to launch that program,” Attard says.
they bring, their ways of working, the things that are
There are similar programs across the PwC global
important to them, and how they will all work together in a team. It seems simple, but it is very powerful.”
network and plans for a platform and website to support communication and collaboration between
The program brings teams together for two sessions,
them.
with support from the Diversity and Inclusion
NEW PARTNERS: MANY ROADS LED TO CYBER
team, for structured discussions around what is important to them and what they bring to the table, and how they are going to work together as a team. “Sometimes you can have a whole range of assumptions about someone’s background or their
The four new female partners in PwC Australia’s Cybersecurity and Digital Trust practice have very different career trajectories, none of which started in
experience or what they do,” Walsh says.
cyber. They demonstrate the range of skills needed
SUPPORTING WOMEN IN CYBER
world.
In addition to its company-wide diversity initiatives,
Pip Wyrdeman has a
PwC’s Cybersecurity and Digital Trust practice also
broad remit at PwC
has a Women in Cyber program that inspires women
covering “all things cyber
to pursue a career in cybersecurity. One of the new
in the government and
women partners, Mary Attard, heads this program.
public sector space, with
“It started out being for our internal cybersecurity team and we’ve extended it across all of our technology and cyber teams,” she says. “Its purpose is to create opportunities for all our women to connect
today to help businesses operate securely in a digital
a particular focus around the defence industry, and some of the home affairs areas as well,” she says.
and network and talk about things that are important
WOMEN IN SECURITY MAGAZINE
23
She has more than 15 years’ experience in ICT
all services that are digitally provided are secure
security policy and cyber security. She was formerly a
for both the provider and the receiver. With remote
senior cybersecurity policy adviser at the Department
work, and patient-centric healthcare services on the
of Prime Minister and Cabinet, and has held positions
rise, there’s a huge role for cyber to make sure these
in the Department of Defence covering roles in
services are safe and secure.”
ICT policy, architecture and business relationship management. Her most recent role prior to joining PwC Australia was with Providence Consulting.
She has a degree in electronics and communications engineering but after a short stint as a network engineer took on the job of developing an ERP
It’s a long way from her early career: a biotechnologist
solution to enable an American company to offer
who spent a decade as a patent examiner. “My
healthcare plans to its employees. She then took on
transition into cybersecurity started because one
more consulting roles in business analysis, program
of the talents for a patent examiner is the ability to
management and technology strategy.
translate very technical, complex information into language that is simple to understand,” she says.
Delivering a digital transformation project for a university sparked her interest in digital technology
“I was able to use that to do a change management
and cyber. “I thought digital was a cool space:
for the patent office back in the early 2000s, bringing
everything’s digital, and we’re moving into digital
a new patent solution into being. That allowed
transformation. But as I was looking for what to do
me to understand a key requirement of digital
next, an opportunity came up to work on delivering a
transformation: a good human connection. I wrote
cyber program.
a lot of policy and procedure around the safety and security of humans. That translated into the development of security policy later on.
“I really enjoyed all the challenges that came with it, and I learnt what cyber means for providing a safe and secure digital service. That’s where my
“My career since then has really been about
journey into cyber started. I feel like my job became
the development of policy, and defining the
the translator between the technical fork and the
rules, compliance regulations, and the strategic
business.”
vulnerabilities around ICT systems, and how they impact on the human systems. That’s how I got into cybersecurity.”
She does not have any formal cyber qualifications, but has recently acquired an executive MBA. “The technical side of cyber never worried me, because
Richa Arora leads PwC’s
I had the technical background,” she says, “But
cyber practice for the
the executive MBA is a very essential qualification
healthcare sector and
to delivering cyber. You get to understand that
works with leaders in
business is multifaceted, to know how to protect it,
other areas to bring
how to provide service, how to communicate with
cyber into all of the firm’s
stakeholders, how to get funding for your cyber
healthcare opportunities.
problems.”
She has more than 14 years of experience in technology consulting, leading digital transformations and cybersecurity programs supporting organisations in federal and state government, financial, healthcare and education sectors. Prior to joining PwC Australia she led the cybersecurity practice at Deloitte in Perth.
Philippa Cogswell is PwC’s national lead for defensive security and perhaps the only one of the four that fits the popular image of a cybersecurity expert.
She also works to grow PwC’s digital identity
She is responsible for
business in New South Wales. She says the two
incident response, threat
disciplines are closely linked. “We want to make sure
intelligence, digital forensics, security operations, and also cyber crisis management.
24
WOMEN IN SECURITY MAGAZINE
F E AT U R E
She is a CISSP and holds numerous cybersecurity
developed the passion for working with technology
qualifications, including a Masters in Information
and for bridging the gap between technology and
Systems Security, an ethical hacker certification and
business that led to her current role.
others in industrial and network security. She has been in the industry for 20 years.
“Working in financial services, I loved solving customer problems. So I spent time in process
However, she started out in a very different field:
improvement and technology implementations, and
studying environmental science at university. After
that’s where I developed a passion for being able to
building her first computer she decided she had a
work with technology and to bridge the gap between
passion for technology.
tech and the business,” she says.
“I started as a systems administrator, moved
“I did a number of Salesforce implementations and
on to become an operations manager then into
really found my home in that space. When I left
government. I worked for security agencies in
financial services, there was an opportunity to join
Australia and the UK. During that time, I helped around
PwC to lead the implementation of a digital identity
network security undertaking cyber investigations and
platform, and having a technology implementation
leading teams,” she says.
background rather than knowledge of cyber was
“From there I moved into industry and worked as a consultant, which took me globally performing
critical. That’s how I made the transition into the cyberspace.
things like threat hunting and incident response in all
“What’s really important in this space is
manner of organisations. I then went to work for a
experience from broader exposure. I’ve done tech
vendor, a machine learning and cybersecurity defence
implementations for over 10 years, worked in
company. It was fairly early days for them. I was
transformation and run a first line risk function. All
running the tech arm across Europe, the Middle East
that enabled me to talk to our clients from a business
and Africa working with a lot of companies to put
lens about what’s really critical in security, how to
defensive security in place.”
manage risk and how to implement technology and
Since joining PwC she has worked extensively on cyber risk management with clients across New
then bring in my technical colleagues to help build that for them.”
South Wales and nationally, and taken on PwC’s defensive security practice. “My key account focus is on New South Wales
Catherine Walsh www.linkedin.com/in/catherine-walsh-24068441/
Government clients, but given some of the work I’ve done formerly in the UK and globally, I also work with some of our clients who are linked to critical national infrastructure,” she says. Mary Attard has been a member of PwC’s Cybersecurity and
Mary Attard www.linkedin.com/in/maryattard/
Philippa Cogswell www.linkedin.com/in/philippa-cogswell-374b59214/
Digital Trust practice for almost four years and leads the Digital Identity team, focussing on the financial services market. She has an accounting background and before joining PwC she spent 12 years in the financial services industry, where she
Pip Wyrdeman www.linkedin.com/in/pip-wyrdeman/
Richa Arora www.linkedin.com/in/richaarora1/
WOMEN IN SECURITY MAGAZINE
25
Source2Create Spotlight
Advertising The market is saturated, so how can you position your companies product or service strategically to your audience to stand out from the clutter? At S2C, we position your creative and content across a mixture of media to generate more excitement and better engagement from your target audience. We explore a range of ideas with our clients to spread their message – the right way.
REACH OUT TODAY
charlie@source2create.com.au
aby@source2create.com.au
www.source2create.com.au
WHAT’S HER JOURNEY?
I have a wide-ranging role, from setting the vision of where we want to be in the future, to fronting the board and audit and risk committee, responding
Narelle Devine Chief Information Security Officer Asia Pacific, Telstra
to media queries, deep diving into an incident, formulating our strategy, reviewing budgets, talking technology solutions, signing off on a culture program or talking to customers. The ability to switch between hats is really important, and so is having a great team of people who can support the many different demands placed upon me. I ended up in cyber security by luck rather than good judgement. I think it chose me. It was something I found interest in through different postings in the military.
I
28
I jumped into the field relatively early. I would have ’m the CISO Asia Pacific for Telstra, leading Telstra’s cyber security capability. I’m also a member of the RSA Conference Advisory
loved to have embraced cybersecurity even earlier, but that career path did not exist when I left school. It has really become mainstream only in recent years.
Board and the Executive Advisory Board for the
I realised how interesting the area was when I started
Australian Information Security Association,
my first master’s degree, in computer science, but
a Fellow of the Australian Information Security
there were limited opportunities as a uniformed
Association, and an Adjunct Professor at Deakin
military officer.
University.
Since obtaining my master’s I’ve progressed my
I love our mission at Telstra: to enable a safer
career by embracing the education opportunities
connected experience for everyone. I love that we are
that abounded in the military, by finding great
able to make a difference, and I love that every day is
mentors, taking calculated risks and being open to
different: I never quite know what will happen each
opportunities.
day, no matter how well I plan it.
I was awarded a Conspicuous Service Medal in the
Everything we do impacts the lives of every Australian
Australia Day Honours List 2016 for “meritorious
in some way, whether we’re tackling scam calls and
achievement through… contribution to the
SMS messages, reducing the delivery of malware via
development of the emerging area of cyberspace
email, or making sure the Telstra network is secure so
operations in the Australian Defence Force”.
we can keep Australians connected.
I genuinely think the key to building confidence is
My big vision is to transform the way my team
continually pushing yourself out of your comfort
embeds security into everything we do at Telstra,
zone and making yourself do things that are not
and share what we do more broadly, so we can help
particularly easy. Over time, you get better and more
uplift the broader security posture of the Australian
confident – time is key. It’s not a special skill. it’s
community.
really just about seizing the opportunities presented
WOMEN IN SECURITY MAGAZINE
W H AT ’ S
H E R
J O U R N E Y ?
and being willing to take a risk, so you make a step
a technical perspective or from a people perspective.
forward when it’s not always comfortable to do so.
I’ve especially valued my mentors from outside
To anyone contemplating a career in cybersecurity, I say do it. Cybersecurity will continue to grow and
the sector because they have given me a different perspective on the art of the possible.
evolve. So we’ll always need a broad range of skills,
I’ve also had the privilege of working for some
knowledge and experience.
incredible leaders. Their support, trust and belief
You don’t need to be highly technical to achieve in cyber: some of my cleverest people aren’t deeply
— and sometimes the odd push — makes a huge difference.
technical, but they bring a way of thinking that adds immense value to solving a problem. You also need to keep an open mind. The roles and progression paths will change as the threat landscape shifts. If you remain flexible and are willing to have a go, you’ll be really successful. And we need diversity, of gender and more. Our industry and teams need people of different backgrounds, ages, ethnicity,
“My big vision is to transform the way my team embeds security into everything we do at Telstra, and share what we do more broadly, so we can help uplift the broader security posture of the Australian community.”
gender, culture… you name it. Our adversaries are diverse, and if we build the right mix of diverse teams, we’ll be able to think differently, anticipate the movements of our adversaries better and move more quickly as a team. Cybersecurity is not something you can do alone. It has many facets. It is a genuine team sport, both within an organisation and in the wider industry. Finding good people and surrounding myself with them has been an important part of my career. I truly value my team, the input of my peers in the industry, and my mentors. They are all critical to my success. I’ve had some excellent mentors along the way, and not necessarily all of them have been from a
If you’d asked me 10 years ago, I would never have thought I’d be in this role. I probably didn’t realise the potential I had. I needed a few people to push me to realise that potential. A great leader can also be a huge advocate and clear the way for you to get on with your mission and achieve results, and I’ve been lucky to work for some great leaders. I also think having a strategic goal and vision, and the ability to clearly articulate it is critical to success. This means the members of your team are all working in the same direction, and united in a common purpose.
cyber background. That variety has grounded me and given me a better
twitter.com/narelle_devine
view of the impact my decisions have: whether from
WOMEN IN SECURITY MAGAZINE
29
“In a stroke of luck, I soon realised that they were implementing a Cyber Safety behaviour change government-funded initiative in Victorian schools. I moved from being a volunteer to a paid role as an adviser working with whole school communities on best practise cyber safety approaches which would in turn upskill educators in cybersecurity practises and decrease cyberbullying. The approach looked like anything from encouraging cyber safety
Helen Sultana Manager, Cyber Security Education and Awareness
lessons in the classroom to including cybersecurity in school values and policies. At the time this was almost unheard of. Cybersafety was almost a taboo subject in schools and I am so proud to have been a pioneering professional in that space”. In taking this step Sultana was realising a long-held ambition. “I knew that a career in technology and in cyber is
H
what I wanted and that this was the perfect step to elen Sultana is Manager, Cyber Security Education & Influence at Australia Post, responsible for raising the awareness of cybersecurity in staff and customers and driving behavioural changes that
boost security. She is part of the Cyber Defence team at Australia Post. “Part of what I do is lead targeted campaigns and training across the organisation. I look for ways in which we can engage our people in security more broadly,” she says. “We also partner with government organisations to run cybersecurity campaigns across the year.” Her role in cyber is one Sultana has come to from a non-IT trained background. She considers her career in education a valuable foundation. Her career began as a primary, and then later a secondary school teacher in Victoria when, in 2015, she contacted the Alannah and Madeline Foundation—a charity focussed on keeping children safe from violence— offering her services. “I decided I wanted to transition out of a traditional school setting and hoped I could begin a career that would include technology”. she says. “I sent AMF an email offering my time and
30
transition out of a traditional school setting.” She says her time with the Alannah and Madeline Foundation shaped her subsequent career path because it involved building relationships and securing cooperation from many people in diverse roles: with the wellbeing teacher, the technology teacher, and the principal and the leadership team. “I quickly developed my own set of what would be now known as principles of influence.” “I now recognise those experiences as the building blocks of my cybersecurity awareness and influencing career. Teaching was something I had in common but I had to adapt. Sometimes I’d visit six schools in a day, and I’d very quickly have to build relationships to drive outcomes putting my principles of influence quickly into practice. I would sometimes have thirty minutes to influence the hearts and minds of the school leaders I was meeting.” Her involvement in the Alannah and Madeline Foundation led, through a contact, to her next role as National Project Manager – Education with the Girl Geek Academy, a global organisation founded in Australia in 2014 that aims to teach one million women technology skills by 2025.
thought a way to transition could to as a volunteer at
“[Girl Geek CEO] Sarah Moran wanted to introduce a
the children’s not-for-profit organisation.”
coding curriculum to primary school teachers. She
WOMEN IN SECURITY MAGAZINE
W H AT ’ S
H E R
J O U R N E Y ?
enlisted my skills and knowledge to build the online
“When I was working at my local primary school, the
curriculum, and then help the teachers train in this
principal one day took me over to a window to look
program,” Sultana says.
at the kids playing outside and said, ‘See every child
“That was quite a scary thing for teachers, particularly at the preparatory to year two-level because it was a new requirement in schools. Again, quickly building
out there? They’ve already developed their adult skills. They are all living and breathing adults. So treat them as individuals.’”
positive relationships and developing a learner-centric
“So I did. I treated them as individuals, all with
program. I found myself leveraging my relationships
complex personalities. I think my journey has been
and offering our curriculum to almost every teacher I
about putting the individual first and making sure
knew.”
anything I do drives the outcome for that individual.”
An obvious next step for Sultana was to move to
From NAB Sultana moved to the eSafety
impact the number of women in STEM (Science
Commissioner as an eSafety Education Advisor.
Technology Engineering and Mathematics) in
“Part of my role was to develop and host webinars
leadership roles. She took up an opportunity at
for schoolchildren and present them to parents. I
National Australia Bank as Girl Geek in Residence in
also develop cyber safety education material and
its Women in Technology Program.
resources,” she says.
“It was an internal program to increase the number
Sultana says the most satisfying aspect of her role is
of women in senior leadership roles. We built a
seeing the impact of her work.
community of like-minded people. My role was to take that program from good to great. ”
She believes the number of women embarking on careers in cybersecurity will snowball. “You can’t be
Sultana says there are some common themes
what you can’t see. If we continue to raise the profiles
running through her career. “I like to do things that
of women in security, we will have more girls and
are challenging, that involve people and cybersecurity
young women choosing careers in technology.”
education, and that makes a difference.”
However, she says teaching a belief in women that
And the variety of roles she has held have contributed
they can have careers in technology starts much
to her professional development. “Across all my roles I
earlier. “As the parent of a 6-month-old daughter, I’m
got to meet and learn from a lot of really great leaders
very conscious of the simple things I do in front of her
and was able to cherry-pick what kind of leader I am.”
in terms of technology and how I give it a go. I won’t
In an effort to raise the profile of women in security and to assist in engaging with the broader cybersecurity community she is an active member
pass my computer to my husband and say, ‘fix it’. I’ll sit with my daughter and offer her a broad range of experiences.”
of the Security, Influence and Trust Group. “I play an
“As a teacher who transitioned to a career in
active role as a member of the Security Influence
cybersecurity, I treat each individual learner as unique.
and Trust (SIT) leadership committee- leading a
I aim to create learning experiences that people
community of industry professionals working together
remember ensuring that the skills and knowledge
to build security-aware cultures. This is how I can
are retained over time. I aim to influence people so
engage with like-minded people across industries and
that they treat cyber just as they would their physical
knowledge share to further make a difference”.
security”.
She also attributes her success to having a growth mindset. And when asked to name the most
www.linkedin.com/in/helen-s-b22151b3
important piece of advice that guided her on her security journey, her answer is surprising: a primary school teacher, very early in her career.
WOMEN IN SECURITY MAGAZINE
31
My degree was in applied information systems, so I had the opportunity to do a year in the industry. This introduced me to PriceWaterhouse, and I spent the next 32 years there in various roles. After completing my degree I joined their ‘computer audit’ team and undertook an eight month secondment in the United Kingdom. I arrived in London in August 1989, knowing no-one but with a job, and a bed for two nights.
Megan Haas Non Executive Director, Tesserent
One year in London wasn’t enough, so I stayed for a couple more, followed by a total of nine years in Brussels and Paris before returning to Melbourne to rejoin PriceWaterhouse, which had become PricewaterhouseCoopers (PwC) following a merger with Coopers & Lybrand.
I
Working across Europe was a fantastic learning experience. I continued working in the information ’m a non-executive director (NED) of a portfolio of organisations. My board roles range across higher education (RMIT University), public sector (Development Victoria), ASX listed (Tesserent Ltd), startup (handdii), and advisory (Suburban Rail
Loop Authority and the Academic Centre of Cyber Security Excellence at the University of Melbourne). With so many different roles, each day brings a different experience. It’s a working style I’ve grown up with, and one I love. My various roles enable me to engage with people across all facets of an organisation and draw upon my experience to help guide and influence the design and operation of governance processes. It’s a plus when I can apply my security knowledge to advance cyber risk management. I have a dual role in my most recent appointment with Australia’s largest listed cybersecurity company, Tesserent. As a director at the board table I’m driving strategy and governance whilst being deeply knowledgeable about the cyber
also blended audit and advisory services across industries, cultures, and often languages. Moving from business to business, understanding their challenges and opportunities, working to implement systems and designing security controls all contributed to building an inventory of use cases to draw from when providing advice. Back in Australia with young children I rebuilt my brand and network one project at a time and started leading teams to deliver services. Over the years I’ve developed, and relish, the ability to engage with multiple and varied stakeholders. After joining the PwC Partnership and creating a solid client base, I focused on the next challenge. I’d worked in the West and in 2011 it was time to head East. So I joined PwC China, based in Hong Kong. For six years I worked with organisations doing business in Asia, assisting them to deliver ‘trust’ in their operations, people, systems, financial reporting,
ecosystem.
culture and ethics.
At university, I took a major in Information Systems
After returning to Australia in 2017 I started to
to complement my Bachelor of Business. This was in the mid-80s when mainframes were the order of the day, and I decided it would be beneficial to understand the electronic data processing environment. I thought being awarded “Best Female in Info Systems 1” was pretty special, given I was the only female undertaking the module!
32
systems risk management team at PwC, but
WOMEN IN SECURITY MAGAZINE
consider what the next chapter in my career could look like. I quickly determined that what I was seeking was the ability to leverage my career experience to date, by adding value whilst being valued. Company director is not a role to be taken lightly, so I invested time in researching the role of boards and thinking through my unique value proposition. I questioned my suitability for the role and consulted with my network.
W H AT ’ S
H E R
J O U R N E Y ?
I experienced the imposter syndrome: believing that
being given to other women. My advice to them is
you are not as competent as others perceive you to
to be open to constructive feedback, but to seek
be. I recall having lunch with a very experienced NED
less emotional adjectives in order to understand any
who responded very directly to me when I questioned
underlying messages. I will not apologise for having a
whether I had the requisite skills and experience to be
view and expressing it in a professional manner.
a director: plain words, delivered directly but which I needed to really hear. I was told to immediately reject such beliefs, that I demonstrably had more than sufficient experience to succeed in company director roles. I’m now established in this next chapter of my career and loving the variety and engagement it affords me. In parallel I have a number of individuals, female and male, who
“At university, I took a major in Information Systems to complement my Bachelor of Business. This was in the mid-80s when mainframes were the order of the day, and I decided it would be beneficial to understand the electronic data processing environment. I thought being awarded “Best Female in Info Systems 1” was pretty special, given I was the only female undertaking the module!”
I mentor from early in their careers to senior executive roles. They benefit from my experience working in Europe and the
I would encourage women to consider a board career
Asia Pacific.
when the time is right for them to move away from
It will come as no surprise to readers that I am accustomed to being the only female in the room. In France (1992) you are expected to speak French or stay silent. The upside of working in such an environment was that I honed my ability to listen and to read the subtle cues of body language. Rising
executive roles. There is a clear shortage of women with security and broader technology backgrounds in non-executive directorships. However, they must overcome the challenges of fulfilling directorial duties, and must be comfortable engaging with senior executives and other directors as equals.
to these challenges made me more resilient. And
My message for female leaders is to take advantage
working across different business environments
of any opportunity to network, be curious, engage
and teams has allowed me to develop capabilities in
with as many different stakeholders as you can,
problem-solving and leadership.
develop your presentation skills, and think about how
Over the years I’ve observed that leadership skills held in high regard when demonstrated by men are not always similarly perceived when displayed by women. I’ve been described more than once as ‘intimidating’
you can demonstrate your ‘human’ skills in addition to your technical capabilities. www.linkedin.com/in/megan-haas-a70b284/
or ‘aggressive’. I prefer to hear those descriptions as ‘candid’ and ‘direct’. When coaching I’ve often heard similar feedback
WOMEN IN SECURITY MAGAZINE
33
Carol Chris General Manager for Australia and New Zealand, GBG
right people in positions where they could thrive, taking a proactive approach to supporting staff, and generating a culture everyone could be proud of. After more than a decade at Optus, I held a range
I
of senior leadership roles across the technology industry, and the focus on people and culture these ’m the Regional General Manager for Australia and New Zealand for GBG, a global company specialising in digital identity. I’m responsible for running our team of 120 in the region to build and deliver products that help businesses
prevent fraud and meet complex compliance requirements. It’s been a 20+ year journey to this point and, hard as it may be to imagine, my career kicked off when Optus launched into the Australian market as a challenger to the merged former monopoly telcos, Telecom Australia and the Overseas
required has stayed with me. In each role, my approach to leadership and building businesses was centred on having a diverse team. Like most in the tech and security industries, I have seen first-hand the importance of attracting women into these fields, and then supporting and empowering them throughout their careers. Consequently, I have regularly mentored young women I work with. A common question I get asked by these women early in their careers is about managing situations when they are the sole woman in the room, or one of only a few.
Telecommunications Corporation (OTC), that became
My advice has been consistent throughout my career,
Telstra.
and still stands: be confident, be yourself.
Those early days of my career at Optus, when it was
It is easy to be overwhelmed by manifestations of the
effectively a startup, were pivotal to my professional
gender gap, whether those be the lack of women in
development. I learned how to work in lean teams
a meeting room, or the lack of female representation
and fast-moving environments, delivering complex
at the leadership level. But it’s important we in the
end-to-end programs and creating go to market
industry never feel the need to change who we are
strategies. The biggest challenge was differentiating
or change our own leadership style to suit others.
Optus’ products and brand from those already in
As women, one of the biggest assets we bring to
market, and trusted by most Australians.
our employers is our perspective. This includes our
It was a unique time to be exposed to new cutting edge technologies, new product development processes, and market testing in an organisation that completely disrupted the telco industry. I quickly
different approaches to leading teams, developing services, designing products, and asking questions. We need to maintain confidence in our competencies, our skills, and our ability to get the job done.
learned the importance of having the right hiring
Since the pandemic we’ve all been forced to take a
processes to attract the best talent, having the
step back and re-assess what work looks like, and how our careers and businesses are being impacted
34
WOMEN IN SECURITY MAGAZINE
W H AT ’ S
H E R
J O U R N E Y ?
by the ‘new normal’ of constant change. In my current
impossible for businesses to always be one step
position, there are two areas most impacted: my team
ahead of hackers and bad actors. Unfortunately, it’s
and my clients.
the fraudsters and cybercriminals who are working
The pandemic has changed my team’s interactions and ways of working in many ways. These changes go beyond working remotely, switching to video calls,
relentlessly to be one step ahead of enterprises, leaving them with little choice but to take proactive steps to counter the steady onslaught of attacks.
and needing to turn homes into office spaces. Meeting the evolving challenges to our team’s mental wellbeing has required constant focus and has reinforced the importance of communication, collaboration and support. More than ever, I’ve found myself talking regularly with staff about their mental wellbeing and the importance of not feeling guilty about finding
“Since the pandemic we’ve all been forced to take a step back and re-assess what work looks like, and how our careers and businesses are being impacted by the ‘new normal’ of constant change. In my current position, there are two areas most impacted: my team and my clients.”
a balance that works for them, including carving out time for themselves. Years ago, this may not have been considered part of a security leader’s typical working day, but I believe this will be an ongoing feature of all leaders’ roles, and particularly crucial to the success of businesses moving forward. Many impacts of the pandemic on our clients are without precedent, but there are learnings from past major industry disruptions that we can adopt and
This is particularly the case for organisations in the banking and financial services sector. The pandemic has produced many challenges over the past 18 months. Disruption and change have been a constant for security and tech leaders. I’m looking forward to whatever change and challenges the future brings up.
re-apply. The biggest learning for the security space is that attacks can come from anywhere and at any time; not just because of the ever-evolving nature of the security landscape, but also because it is
www.linkedin.com/in/carol-chris-80a4772/
www.gbgplc.com/apac/
WOMEN IN SECURITY MAGAZINE
35
WOMEN IN SECURITY NOMINATIONS & JUDGES The Annual Australian Women in Security Awards showcases the everyday heroes who are demonstrating real leadership and ambition in their ideas, passion and drive to combat some of the issues we face in the current security landscape. Our mission is to continue to inspire future generations to work in the IT security/cyber/protective security fields. And to elevate technical skills, impactful solutions, and commitment to giving back to the community. Honourees will be recognised on December 8th 2021 at the Annual Australian Women in Security Awards.
2021 CATEGORIES • Best Program for Young Women in Security
THE PROCESS
• Best Place to Work for Women in Security • Unsung Hero • The One to Watch in IT Security
1
This year we received 643 Nominations across 16 categories.
2
All nominations within each category have been submitted to the esteemed judging panel.
3
Finalists announced September 22nd 2021.
4
Winners announced Live and streamed virtually from the Crown Sydney, December 8th 5:30-10:30pm.
• IT Security Champion • Australia's Most Outstanding Woman in IT Security • Best Security Student • Best Volunteer • Male Champion of Change • The One to Watch in Protective Security • Protective Security Champion • Most Outstanding Career Contributor in Protective Security • Australia's Most Outstanding Woman in Protective Security • Best Female Secure Coder
INTRODUCTION TO OUR 2021 JUDGING PANEL MICHELLE PRICE
ANGIE MURRAY Transition Manager, Managed Security Services CyberCX
CATHERINE DOLLE-SAMUEL
CEO AustCyber
Business Continuity & Resilience Specialist UNSW
DUSHYANT SATTIRAJU
JACQUI LOUSTAU
Cyber SecOps Team Lead Deakin University
Founder AWSN
JANE FRANKLAND
TAMARA MARTIN
Owner & CEO Knewstart (UK)
Security Resilience AGL
RACHELL DE LUCA
NIGEL PHAIR
Chief Security Officer Department of Parliamentary Services
Director UNSW Canberra Cyber
RACHAEL LEIGHTON Cyber Strategy & Influence Telstra
JAMES NG
REBECCA WINFIELD Protective Security Operations & Delivery IAG
DR MARIE BODEN
GM- Security Operations AARNet
Outreach Officer Research Interaction Design University of Queensland
CATHERINE BUHLER
GAI BRODTMANN
CISO Energy Australia
Futures Council Member National Security College
SAMM MACLEOD
LIDIA GIULIANO
Information Security Consultant
Information Security Advisor ANZ
ANDREW DELL
MICK DUNNE
CISO QBE Insurance
CISO-CSO AustralianSuper
DR MARIA MILOSAVLJEVIC CISO Services Australia
IAN YIP CEO Avertro
challenging, but the training was incredibly useful to help frame my thinking about my company’s cyber
Christie Wilson Cyber Resilience Manager, UniSuper
resilience program — which I created from scratch — and how to communicate progress with stakeholders. It validated my approach to that program. Aside from gaining that qualification, I think my sense of curiosity and desire to continually learn have been really important in enabling me to fulfil not just this role, but all the roles I’ve held across my career.
I
Every day’s a school day. It’s impossible to keep up with everything security related, but it’s important to ’m a cyber resilience manager. I studied sociology
maintain a broad understanding of what’s happening
at university. And I think I began to use my
that could impact the industry sector I work in. I
university qualifications only after I moved into
spend a lot of time engaging with industry peers and
security.
colleagues to both share intelligence, and to keep
Sociology is the study of social life, social change,
and the social causes and consequences of human
Security is often a game of cat and mouse. Risk
behaviour. Many of the research techniques used in
management is our day-to-day work. Issues are
sociology are very applicable to cybersecurity.
going to arise, and our role is to be constantly alert to
For me, getting into cybersecurity was a leap of faith.
emerging threats, and to respond accordingly.
I was managing a governance, risk and compliance
I also try and read widely to keep across the way
team when my new manager asked if I could help
cybersecurity is presented in the media, and to gather
the network security team with an audit report.
ideas about how to present cybersecurity content to
Shortly afterwards, two amazingly talented and very
our people in ways that are engaging and meaningful.
experienced security professionals joined our team and we commenced an uplift program. I’ve now been enjoying the best role of my career for four years.
The most challenging aspect of my role is winning the hearts and minds of our people to build their cyber resilience. Cybersecurity might be the most
As a cyber resilience manager, my job is all about
exciting and important thing in the world to security
reinforcing and strengthening my organisation’s
people, but to others it’s not. So, it’s a constant
cybersecurity culture so our people understand and
balancing act to deliver cyber safety content and
respond to cybersecurity risks. I provide cybersecurity
messaging that strikes a chord with our people.
awareness, education and training to our employees, and reporting to our board and management.
I’m incredibly lucky to have a very progressive manager, and a quarter of our security team are
The training I provide covers compliance, phishing
women. Their diversity of thinking is critical for
and security incident response training, and I also
addressing security challenges. I work with a team
manage a cybersecurity champions group.
of incredibly experienced and talented security
I have one security qualification, the SANS Security Awareness Professional. Gaining that was quite
38
across emerging threats and emerging trends.
WOMEN IN SECURITY MAGAZINE
professionals, and I bring a completely different skill set to the team. I can honestly say that I’ve always
W H AT ’ S
H E R
J O U R N E Y ?
felt my contributions are valued and respected. I know
our security champions program while we were all
I’m very privileged to work with such a team.
working remotely.
Finding new ways to keep people interested and
And my most memorable security experience
engaged, to maintain momentum and keep the cyber
was creating a cybersecurity mascot, because I
safety conversation alive is a never ending challenge.
wanted the team to have a visual identity across
A big part of our cyber resilience program is giving
the organisation. He now has a life of his own and
our people constant nudges in the form of ongoing messaging, awareness and training. Sometimes, something happens that creates a real sense of achievement. One day I ran into a work colleague at my local shopping centre. He mentioned he’d reported the phishing drill I’d sent out a few days prior, based on a genuine phishing email. I was thrilled to learn that he was on high alert for unusual or suspicious emails. It told me that our training was working. This training became an even
The most challenging aspect of my role is winning the hearts and minds of our people to build their cyber resilience. Cybersecurity might be the most exciting and important thing in the world to security people, but to others it’s not. So, it’s a constant balancing act to deliver cyber safety content and messaging that strikes a chord with our people.
bigger challenge when, like most corporates, my company moved to a remote working model almost overnight in the early days of the pandemic. As a team, we spent a lot of time raising awareness and educating our people about the new security risks and threats that came with the pandemic. This included everything from raising awareness about covid-themed phishing attacks to guidance on how to work from home securely, and advice about the national COVID-Safe app. In addition, we had to continue the cyber resilience program for our people when the methods of engagement I’d previously used (like face-to-face
features in our training modules, presentation packs, cyber safety videos and email signatures. We’ve recently had challenge coins made featuring him as well, which is really exciting. I had not realised how much of an achievement this was until new people joining the team from other organisations commented on how hard it could be to get traction on ideas like mascots. www.linkedin.com/in/christie-wilson-9135317/
training, and lunch-and-learn meetups) were no longer possible. One of my proudest achievements over the last 12 months has been launching and embedding
WOMEN IN SECURITY MAGAZINE
39
Mentoring Pilot AWSN is pleased to launch the 2021 Australian Women in Security Network Mentoring Pilot.
Looking for ways to give back? We need you Learn more at awsn.org.au/initiatives/mentoring/ Sponsored by
40
WOMEN IN SECURITY MAGAZINE
Powered by
CAREER PERSPECTIVES
BRIANNE HADLEY
RISKY, FEARLESS AND FIERCE:
WHY I PLAN TO GET MORE WOMEN INTO THE INDUSTRY— BY LEAVING IT by Brianne Hadley, Creative, connector and Knowledge vacuum
42
I have spent nearly 15 years working in the group
perspectives are important to the intelligence and
insurance industry. I spent most of those years
investigation cycles. We talk about how change in the
in investigative roles, focused on finding and
industry is essential to its health and effectiveness.
investigating fraud, identifying potential criminal
We talk about recruiting specialists from other
activity, and experimenting with intelligence-led
sectors, improving recruitment and graduation
policing models in the private sector. I love my job. I
rates in STEM fields. We talk about mentorship and
love the people I work with. I am proud to be in such
sponsorship, incorporating skills from the arts, and
a dynamic field with supremely talented women (and
breaking down both real and perceived barriers for
men).
women in security and related fields.
PASSION, ON ITS OWN, IS NOT ENOUGH. WE NEED PURPOSE.
TALK, ON ITS OWN, IS NOT ENOUGH. WE NEED ACTION.
In the past year, I have been actively involved in
When the world stopped in 2020, I was in
conversations about women and our roles in both
Mozambique on sabbatical. I had arranged to spend
private and public security. We talk about women
several weeks with a program called Project Purpose.
working in the security industry. We talk about how
This program works to fight all forms of sexual
WOMEN IN SECURITY MAGAZINE
C A R E E R
P E R S P E C T I V E S
injustice through, among other things, education and vocational training through its day centre programs. My first week was more or less business as usual, but it was not long before institutions (including the day centre) started to close due to the community spread of COVID-19. Fear started to spread in the community. The following week, the local hospital reached out to local non-profits, requesting
“While my social skills have improved, I am still often oblivious to basic social cues, especially from strangers. I usually rely on those I know around me to nudge me into propriety. I can (and will) turn small talk into a 30-minute lesson on the origin of olives in martinis, a discourse on an article I read about neural networks or a debate on species-appropriate diets for pets and livestock.”
non-medical face coverings for patients coming into the hospital. Medical protective
Passion and purpose, talk and action, space-making
equipment is difficult to obtain in these regions,
and skill-building. Each concept needs to be included
and the hospital wanted to reserve medical masks
and held in balance with its counterpart.
for health care workers and still provide protection for patients and their families. The hospital paid hobbyists to sew these masks and then distributed them at little or no cost to patients. I watched these women, who western society would call “rag-tag” (if they noticed them at all), go from sad and afraid to
I have come to realise that my approach was not in balance. I need to leverage my passion into a purpose, convert my talk into action, and focus my energies on helping others prepare for opportunities, rather than just creating them.
determined and empowered. Because they had the
For me, it means leaving security and intelligence for
skills and because others provided access to the
high school teaching.
equipment, they could take advantage of a lucrative
I wanted to be a teacher when I was in primary
business opportunity to create an independent stream of (potentially permanent) income for themselves and their families in an otherwise barren employment landscape.
CREATING OPPORTUNITIES (SPACE-MAKING), ON ITS OWN, IS NOT ENOUGH. WE NEED PEOPLE POSITIONED TO LEVERAGE THE OPPORTUNITIES WE CREATE (SKILLBUILDING).
school, and I have resisted becoming a teacher since high school. My experience in school was difficult. I excelled academically but failed socially. I graduated vowing never to enter a public school again. However, you cannot resist what is in you to do and to be. In every job I have had, training eventually became a key part of my day-to-day activities. In fact, the aspects of my life and personality that made high school hard are among the reasons I have done well in my investigative career and the reasons why I am making the switch.
WOMEN IN SECURITY MAGAZINE
43
I am a learner and a knowledge-sharer—a “nerd” if you
people who have the interest and are willing to pursue
will. My idea of “vacation reading” is one part Jane
the skillsets. However, for me, and I think for some
Austen, one part Miss Marple, and one part academic
others, it is time for a change.
journal. I binge-watch nearly as many documentaries as I do comedies and Korean dramas. I seek out opposite opinions and healthy debate. I learn (and share) about anything and everything. The curiosity and “jack-of-all-trades” pursuit of knowledge that has informed my investigative and intelligence practices have taught me how to consider problems from multiple perspectives, and find creative solutions. While my social skills have improved, I am still often oblivious to basic social cues, especially from strangers. I usually rely on those I know around me to nudge me into propriety. I can (and will) turn small talk into a 30-minute lesson on the origin of olives in martinis, a discourse on an article I read about neural networks or a debate on species-appropriate diets for pets and livestock. My former roommates, and many of my friends, will all attest to my tendency to “lecture” (I prefer to call it “information-sharing”) when some interesting topic comes up in our conversations. For a long time, I let those high school experiences and lack of social finesse dictate my choices. I let a fear of being “weird”, “different” and “awkward” shape my decisions, my plans, and my goals. I got out of
The women we are trying to recruit, the young women we are trying to nudge into post-secondary STEM degrees, and even the men trying to keep us away from the table, they all need to see examples of us as women being who we are. They need to see us pursuing what is important to us, individually, within our respective industries. They need to see us as risktakers. They need to see us as fearless. They need to see us as fierce. As you consider next steps in your career, consider my story. Most of you probably do not need to turn your life upside down and shake it up as I did. That said, small decisions and minor changes create big shifts over time. Maybe you just need to find that one idea “someone” should do, and do it. Maybe you need to take an art class, join Toastmasters, or learn to sail. Maybe you need to find a few “rules” to rethink. Maybe you need a long vacation. Whatever it is, find it; and if you are a people leader, encourage those you lead to do the same. Take risks. Be fearless. Be fierce. Above all, be you. More info on Project Purpose for those interested: https://www.projectpurposemz.org/
balance. I have had a fulfilling, rich and fun career. I would not change it, and I happily recommend it to
44
WOMEN IN SECURITY MAGAZINE
www.linkedin.com/in/brihadley
FINDING CYBER TALENT: WHAT’S IN THE SECRET SAUCE? by David Braue
Cyber recruitment is a seller’s market – so how can you lure the best recruits?
‘Y
ou never get a second chance
the professionalisation of cybersecurity work – or
to make a first impression’, the
covert, such as failing to check their published job
saying goes, and when it comes
descriptions for gender-specific language with free
to cybersecurity recruitment it
tools like the Gender Bias Decoder.
couldn’t be more apt.
support for flexible work in every job description, can
in the way companies find and recruit employees, the
also add to a company’s appeal to potential recruits.
window to impress potential recruits is smaller than
So, too, is taking care to speak in abstractions
ever: once they click away from your website or job
about required technical skills rather than specifying
ad, they may never come back again – and they’ll tell
specific tools.
their friends.
Studies suggest this last point is crucial for engaging
Open job postings and targeted recruiter drives
women – who are, according to anecdotal evidence
have been complemented with the sometimes-
that was confirmed by Talent International’s recent
overwhelming process of sourcing staff via social-
Women in Tech study, often far too ready to judge
media – where many companies still struggle
themselves unworthy of an advertised job if they
to brand themselves and their jobs in ways that
don’t meet its laundry list of esoteric specifications.
will attract female, non-binary, minority and other traditionally-marginalised candidates.
46
Actively advertising lifestyle-related qualities, such as
Yet after years of seismic change
Technical skills can be learned on the job, of course, and most employers are willing to train the right
The needed changes can be overt – most companies
person if they have the other qualities to suit the
are, for example, running away from the stereotype
role. But with 38% of the 400 survey respondents
of the hoodie-wearing hacker as they promote
admitting they ‘de-select’ themselves because they
WOMEN IN SECURITY MAGAZINE
F E AT U R E
don’t meet 100% of a listed job’s criteria – the biggest single obstacle among respondents – it’s clear that many women aren’t even giving themselves the chance to make their case. And that, Hudson senior talent specialist for cybersecurity Anuj Sabharwal told Women in Security Magazine, is doubly a shame because many women have the soft skills that have become even more valuable than having a laundry list of technical certifications. “Soft skills are the secret sauce to being successful,” he explained. “Stakeholder management skills are the biggest one that we see as a massive gap: you have the most switched-on technical architects who can’t really articulate to a business why they’re spending $5m on security.” “Soft skills have always been important – but in the recent past, it’s much more so,” he said,
dangerous enough to speak to project managers,
noting that many companies were facing a steep
legal teams, HR teams, COOs. Those are literally like
learning and recruitment curve around cyber to meet
gold dust.”
governance, risk and compliance (GRC) requirements. “With the added regulations that we’re seeing from ASIC and APRA, you’re seeing all these ASX-listed businesses who have never really had a security person before, having to get an understanding of this,” he said. Recruiters work extensively with candidates to identify their strengths and potential fit for clients – and the goal, Sabharwal said, is to use a broader lens to identify the “cream of the crop” who have a bigger vision for their careers than just earning more money and gaining more responsibility. “The secret sauce is there,” he said, “when we find people who have that balance of being technically dangerous enough to have a conversation with technical stakeholders, but also being technically
EMPLOYERS NEED THE RIGHT SAUCE, TOO Challenges finding the right security staff are nothing new, Gartner managing vice president for security and risk management Beth Schumaecker said during a Gartner Security & Risk Management Summit session earlier this year. “For years, we’ve been talking about how really good security talent is hard to keep and find,” she said, noting recent research that found just one-third of companies report that hiring security professionals is easy. “I don’t know that I believe them,” she said, “but for everyone else it is a constant refrain to get the right people for certain security roles.”
WOMEN IN SECURITY MAGAZINE
47
Growing awareness of cybersecurity as a profession
believe they have been overlooked for promotions due
had delivered a growing number of entry-level
to their gender; and 35% say they have been excluded
workers but advanced skills remain chronically
from decision-making conversations.
difficult: “we need to recognise that when we look across our portfolio or out in the hiring market, what we need is unlikely to exist in one person,” Schumaecker explained, reiterating the importance of sourcing talent internally as well as looking for it in the market. Yet however well a company portrays itself to recruiters or on LinkedIn position descriptions, people already working within the organisation aren’t going to be so easily won over.
“As women climb up the corporate ladder,” the report notes, “salary negotiations and cultural fit become increasingly larger hurdles to overcome while across the board, self-deselecting is the most prevalent challenge.” Even informal processes can taint the experience for qualified women, with Project F CEO and founder Emma Jones noting that failing to fit in with social cliques – “normally centred around drinking, sporting, gaming” – mean that women “miss out on informal
In this context, conversations about deepening their
involvement and introductions to people who can
commitment to the company may quickly turn into
help you in your career.”
diatribes about many of the well-worn obstacles to diversity that continue to plague women in today’s workforce. Fully 56% of the Talent International survey respondents, for example, believe their career prospects are unclear at their current employer; 45% believe they aren’t paid the same as males; 44%
“This really does affect women’s ability to progress and creates favouritism.” Such reports from the coalface provide a to-do list for companies seeking to make themselves more appealing for technical staff – ensuring they have the ‘secret sauce’ that will win over candidates who themselves have what it takes.
WHAT HAS BEEN THE BIGGEST HURDLE YOU HAVE FACED IN THE HIRING PROCESS? Self-deselecting based on feeling that you don’t meet 100% of the criteria
Negotiating a salary worthy of your experience
Difficulty articulating / selling achievements
Perceived ‘culture fit’ with a predominantly male team Interviewer bias / discrimination
6%
Biased wording of job ad
1%
Other
48
6%
WOMEN IN SECURITY MAGAZINE
14%
10% 17%
38%
F E AT U R E
Ensuring the company has female representation at all levels, for example, will go a long way towards convincing the best candidates that you’re not just another festering boy’s club – and, given the visibility into your management structure that LinkedIn provides, you’re not going to be able to hide it if you are. “There are companies wanting
“Soft skills are the secret sauce to being successful,” he explained. “Stakeholder management skills are the biggest one that we see as a massive gap: you have the most switched-on technical architects who can’t really articulate to a business why they’re spending $5m on security.”
a diverse workforce because they think it looks good, and they think it’s a selling point, and they have a quota to hit,” said Rachael Mayne, senior associated for cyber security and GRC with u&u Recruitment Partners. “But they are never going to have the right sort of culture.
a hard one because manager and senior-level salaries aren’t going up the same amount. Companies don’t have unlimited funds, so they need to figure out how they manage that – because they obviously need the team.”
MONEY CAN’T BUY YOU LOVE
While it’s important, however, salary alone isn’t the
Just as employers value ‘soft skills’ that bridge
secret sauce that it used to be.
technical and business domains, savvy recruits are
A recent survey by recruitment firm Contino, entitled
looking for a workplace where they will feel both valued and empowered – but that doesn’t mean they’re willing to work on the cheap. Particularly in the year since COVID-19 put the world’s entire business community on a fast-track for digital transformation, demand for cybersecurity expertise has grown significantly – as have salary expectations.
The Voice of Talent 2021, found that while salary was the highest priority for women and second highest for men when choosing a job, it was only the sixth highest reason for leaving. This suggests that a high salary is important to get someone in the door – but that many employees will be willing to put up with a less-than-stellar wage in return for softer benefits such as the intellectual
A cybersecurity employee with one or two years’
stimulation of modern technology stacks, promises
experience will typically be demanding more than
of career progression, work flexibility, and a good
$10,000 higher salaries than they would have before
company culture.
the pandemic, said Mayne. That could push entry-level salaries from around $80,000 or $90,000, up to the $100,000 to $120,000 range, she said – and skilled recruits are proving quite happy to walk away if employers don’t come to the table.
“The competition for top talent has never been more aggressive,” said Gerhard Schweinitz, Director of Talent, APAC at Contino. “Any organisation who wishes to attract and retain the right people must understand how people view the workplace now. Our research shows that as businesses begin their
“Companies that are refusing to pay it aren’t finding
journey towards recovery, they need strong leadership
the people that they’re looking for,” she said. “But it’s
to chart the way forward to success.”
WOMEN IN SECURITY MAGAZINE
49
IAN YIP
HOW TO GET AN ENTRY-LEVEL CYBERSECURITY JOB IN 2021 by Ian Yip, CEO of Avertro
Ian Yip is the CEO of Avertro, a venture-backed cybersecurity software company. There is no shortage of people wanting to break into the industry, so how do you stand out?
THE UNICORN A few years ago, I hired someone into our team at one of my previous employers. Despite having zero commercial cybersecurity experience yet wanting to break into the industry, they weren’t sure they wanted the job. Today, they are still at that company, but in a different team doing the role they ultimately wanted. At the time, their day job wasn’t fulfilling. But it paid the bills. The most interesting thing, however, was they maintained a blog purely focused on cybersecurity. And they wrote about all the things they’d experimented with, learned, and achieved as part of their hobby.
50
WOMEN IN SECURITY MAGAZINE
This person wasn’t actively looking for a job. They didn’t even know I existed. But I’d seen enough: “I have to hire this person.” I sent them a message introducing myself and asked if they were open to speaking with me about a potential role in cybersecurity. They agreed, but could only be available during lunchtime because their workplace at the time kept employees on very short leashes; they were only “allowed out or could speak with people during lunch”. I took this person to lunch, spending the first half finding out about them and what made them tick. I spent the second half pitching them on why they needed to join our team. The stumbling block in their mind despite wanting to break into the industry was that they wanted to be a pentester. The role we were offering wasn’t exactly
C A R E E R
P E R S P E C T I V E S
what they’d envisioned. My pitch was essentially this: “It’s great that you want to be a pentester. I believe you have the attitude, hunger, and intelligence to get there. And you should take the role we have on offer as a way to get there. It will provide a foundational experience in cybersecurity that you’ll benefit greatly from.” They thought about it and a few weeks later, they joined our team. Today, that person is a pentester, and I am extremely proud of them.
PROVE, DON’T JUST TELL We’re kidding ourselves if we think the majority of cybersecurity professionals are in the industry because of their passion for it. Many are in the industry because it pays well.
Truth be told, most people aren’t passionate about their line of work in the same way they are about something they truly love. This is not to say there aren’t people who love cybersecurity. When we try to ascertain someone’s “passion” for cybersecurity, we’re really trying to figure out if they have the curiosity, conviction, and persistence to solve problems and get the right outcomes. Everyone trying to get an entry-level role in cybersecurity says they are passionate about the topic. So ask yourself: “How am I proving that I’m truly passionate about cybersecurity?” You’ve probably completed some courses or certifications. You might even have a university degree with the word “cybersecurity” in the title. This does not differentiate you. Studying doesn’t prove to
WOMEN IN SECURITY MAGAZINE
51
the world that you are passionate about something. It shows that you found the topic interesting enough for your own personal reasons to spend some time learning about it. Ideally, you will come up with your own unique ways to prove that you want a cybersecurity career for the right reasons. Here are some examples: • Write blog posts. • Start your own cybersecurity project to build on your foundational education. • Share articles (via social media) you’ve read that you find interesting, including what you learned. • Attend events or webinars and tell people on social media what you learned or found interesting about each. • Join industry associations or groups and actively participate. Most importantly, do these things regularly.
I WANT TO BE A PEN TESTER OR SOC ANALYST That’s great, but so does everyone else trying to get an entry-level role in cybersecurity. The reality of it is, most will not get one of these roles as the “foot in the door”. The industry needs pen testers and SOC analysts. But we usually need them to be experienced and effective. Every now and then, a larger company will want to hire an entry-level pen tester or SOC analyst and be willing to train them. For every one of those roles advertised externally, there are 100+ people who apply for them. It’s a very long queue. Organisations are more likely to train someone internally into one of those roles. They likely already have entry-level people learning on-the-job about other aspects of cybersecurity and it makes more sense for them to find their new trainee pen tester or SOC analyst from the internal pool of junior team members. In addition, a large proportion of these roles aren’t advertised. They are sourced internally, or via one’s own network. I get these calls all the time from people I trust, and who trust me. Nothing ever gets advertised, and the roles still get filled.
52
WOMEN IN SECURITY MAGAZINE
Cybersecurity is more than just pen testing and SOC analysis. Other types of roles you can look at include: Awareness and Education; Communications; Identity and Access Management; Security Governance; Risk Management; Regulatory Compliance; Privacy, Application Security; Cloud Security; Vulnerability Management; Third-Party Supply Chain Risk; Data Protection; Business Continuity; Incident Respons; Digital Forensics; Policies, Standards, and Guidelines; Business Intelligence and Reporting; Quality Assurance and Testing; Program/Project Management; Business Analysis. This is not an exhaustive list, but I hope this makes it clear how many other avenues you have into an entry-level cybersecurity role.
THE WORLD IS BUILT ON RELATIONSHIPS You should already know this; it’s especially true in a crowded field of entrylevel candidates. Learn to network a little, even if it doesn’t come naturally to you. You don’t need to be a social butterfly. But as someone looking to get into cybersecurity, it does help to get to know some of the folks already in the industry. Given the relevance of cybersecurity today, there will inevitably be a number of industry groups, meetups, events, and conferences in your location. Make it a point to learn what’s available. Of course, in a post-COVID world, there aren’t nearly as many opportunities for industry events. But they haven’t disappeared completely. In-person or virtual, quite a number are free to attend; target these in the first instance. For example, in our region, the Cyber Risk Meetups are excellent. The Australian Women in Security Network (AWSN) is another great initiative to get involved with.
C A R E E R
P E R S P E C T I V E S
Another way to stand out is to be referred by a mutual connection. For example, a mutual connection reached out last week and told me we would be doing ourselves a disservice by not speaking with a candidate. So I interviewed them and was subsequently glad that I did. The aforementioned person is now on our shortlist of candidates for one of our open roles. I understand that when one is trying to break into an industry, you likely don’t have very many connections. So how do you get them? There’s no easy way to do it. You just have to start. Look for all the people you respect and think you could learn something from. Follow them on social media. Try to figure out if you have a mutual connection. If you do, ask your mutual connection for an introduction. If not, then at least follow them for some time and understand what they care about and are interested in before reaching out to ask for a conversation. If they agree, spend the time learning and asking for advice. Don’t expect anything back. You should definitely not try to sell them anything, or ask for a job. If they are a genuine person, they will likely try to find out what your aspirations are, which is your permission to tell them. Even then, talk about your goals at a high level. Don’t say: “I’d like a job at your company.”
SO YOU GOT AN INTERVIEW Congratulations! Getting an interview is difficult, particularly if you are trying to get an entry-level position. We’re currently hiring for an entry-level cybersecurity role at Avertro. It’s not a pen-testing or SOC analyst role. There were 80 applicants, and we’ve shortlisted 15. I interviewed all 15 people. 20% of them did not make it past the first 10 minutes of the interview with me because they failed the most important question. Even if you fail the interview early, how you react means a great deal. One of the candidates spent the rest of the interview thanking me for the feedback and explaining how they intended to improve and that they would love to have an opportunity in the future to prove it to me. You know what, I’d likely speak to them again for a future role if they show they’ve learned their lesson. Another hung up on me immediately before I had the chance to thank them for their time. All that did was prove I made the right decision. I will likely never speak with this person again. The other 80% made it all the way through the 30-minute interview, and we’ve shortlisted three. Why did these people make our final shortlist? Because they exhibited the common traits many interviewers are looking for in their top candidates.
KEY TAKEAWAYS • If you’re truly passionate about cybersecurity, differentiate yourself by proving it. • There is so much more to cybersecurity than being a pen tester or SOC analyst. • Relationships and networks matter, even at entry-level. • Learn how to interview well: there are literally guides on how to do it right.
www.linkedin.com/in/ianyip/
www.avertro.com/
WOMEN IN SECURITY MAGAZINE
53
NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum
Setting boundaries on teen’s device use Teens might think they know everything (just ask them!) but the reality is they need their parents to set boundaries and guidelines: guidelines for schoolwork and homework; guidelines for social outings with their friends; guidelines for helping with chores in the home. Use of technology is no different: it too needs guidelines
Where can devices be used in the home? The aim is to have devices used in a common area where other family members are constantly walking through and can hear what is on the device. This might be a lounge room or family room. It is advisable to make sure that bedrooms don’t have TVs or gaming
Boundaries and guidelines for tech use are designed to help keep your teen safe when they are online. These will look similar for most families but will not necessarily be exactly the same. They will depend on the children’s ages and on their parents’ beliefs, family values and morals.
consoles in them. This is not going to be an easy sell. Older teens like their privacy, and this is only natural. By setting the boundaries recommended in this article, it is probably OK to allow your teen a little privacy with their phone. However, you will need to be hyper-aware that this opens the door to dangers, and
In a perfect world, it would be ideal to implement tech
you will have to be constantly on the lookout for any
boundaries and guidelines for children from a young
changes in their behaviour that might signal an issue.
age, tweaking them when necessary, so by the time they enter their teenage years, these practices are well embedded.
Be sure to come up with some Tech Free Zones such as the dinner table and the car. Tech Free Zones create opportunities to engage in conversation with
It can be difficult, but not impossible, to introduce tech guidelines for teens.
your teen. When can devices be used? This guideline will look
Some teens are actually grateful to have boundaries
very different in every family. It might be agreed
around their tech use. They know, left to do their
that devices can be used once chores are done or
own thing, their device use will likely be excessive.
homework is completed. You might decide that your
Boundaries can also give teens an ‘out’ when their
teen can use their device for homework between
friends are communicating via
4pm-6pm and then 7-7.30pm for personal use. The
social media or group chat
decisions you make around when your teen can use
and they would prefer to
their device will be based on their age, school and
remove themselves. “I’m
sporting commitments, hobbies, daily routines and
not allowed to use social
your parenting methods and beliefs.
media/chat after 9pm” is the perfect way a teen can take themselves out of a situation they don’t want to be in. To get started, parents should map out their own ideas on how the boundaries
54
Here are the areas to address:
How can devices be used? Talk to your teen about how they are using their device. Devices can be used actively for educational purposes such as learning, reading, creating digital art, or passively such as to watch movies or YouTube. It is important to help your teen understand the different uses so they can begin
for tech use are going to look in their
to make positive choices about how they are using
home.
their device.
WOMEN IN SECURITY MAGAZINE
C O L U M N
Devices should not be used and charged in
face in this pandemic, it could be damaging to block
bedrooms overnight. This is a non-negotiable rule.
them from social engagement.
Make sure you have a central charging station in your home where all devices sleep at night. Chargers should ‘live’ here and should be placed there at an agreed time every evening. Keeping devices out of bedrooms increases the quality of sleep. There is no chance of phone notifications disturbing sleep, no opportunity for social media use during the night to increase the chances of cyber bullying, and no opportunity to take and share inappropriate images, or talk to strangers. Teens using devices for homework often causes tension in the home. We want our kids using their devices in a common area of the home, but everyone doing homework in the lounge room or the dining room during the afternoon and evening (sometimes
Now that you have mapped out how you would like the boundaries to work in your home, go back over them and decide what your lowest limit is for each. Why? Because when you ‘meet’ with your teen to get their input, the first thing they are going to want to do is negotiate. So, you need to give yourself some wiggle room and start high. You would be crazy to create these boundaries, write or print them out and present them to your teen thinking they will happily agree to them. I recommend grabbing a whiteboard, explaining that you are happy for them to use their phones, iPads and gaming consoles but that their safety is your number one priority, and you would like their input in coming
until late for older teens) just isn’t an option. This
up with some ways to keep them safe.
is where an agreement that homework is done at
A tip here is to have yourself (and your partner)
their desk with the bedroom door open and without headphones on is helpful, as well as using a cyber safety solution to limit their access (think Netflix and YouTube) during homework time. If your teen has social media accounts, you can make it a rule to sit together and set the available privacy settings in those accounts. When setting boundaries with your teen, you need to agree in advance what the consequences will be if they don’t stick to the rules. There are predominately two schools of thought here. The first is to remove the device from the teen altogether and the second
willing to agree to these rules as well. Setting ‘family boundaries’ that everyone has to follow is much easier for your teen to accept than having boundaries dumped on them alone. Now pull out your best boardroom negotiation skills and work that whiteboard with them until it matches the map you created. Take a pic on your phone and share it around so everybody is on the same page. If the boundaries stop working for you for some reason (new school commitments etc) then take a minute to get together as a family to review and amend them.
is to allow them to use the device, but take away a different privilege such as allowing them to attend the movies with their mates that weekend. I’m not going to tell you which one you should use. Because you know your teen best and probably have a particular parenting style, you will most likely already have a preference as to what type of consequence will be most effective for your teen. It is
www.linkedin.com/in/nicolle-embra-804259122/ www.thetechmum.com www.facebook.com/TheTechMum
www.pinterest.com.au/thetechmum
important to remind you that teens use their phones to communicate with their friends — phones are very much part of their social life. With the challenges we
WOMEN IN SECURITY MAGAZINE
55
A PROGRAM THAT CONNECTS, SUPPORTS AND INSPIRES FEMALEIDENTIFYING TERTIARY STUDENTS AND EARLY CAREER PROFESSIONALS.
"When women work together, they become a force to be reckoned with. Be part of a force for good in the security industry, by joining the AWSN Cadets program today!" - Liz B, Co-Founder
Studying or an Early Career Professional in information security? Learn more at awsn.org.au/initiatives/awsn-cadets/ 56
WOMEN IN SECURITY MAGAZINE
INDUSTRY PERSPECTIVES
FIVE STEPS TO ACCELERATING CONSUMER SECURITY AND DATA USE TRUST DURING A PANDEMIC by Julian Ranger, Executive President, and Founder at Digi.me | Australian Data Exchange, A/NZ Representative of Digi.me
T
here is a long-held maxim about the virtues of simplicity. For years sectors and entities, from the navy to newspapers, to designers have adhered to the KISS principle: Keep It Simple, Stupid.
It reflects the premise that most systems work best if kept straightforward, rather than being made unnecessarily complex. And it holds true for technology as much as for anything else. The desire to make products and services stand out from the crowd can too often translate, mistakenly, into making them the biggest and the best, and then putting a cherry on top. But, designing something that actually does what it says on the tin, and delivers an outstanding user experience, is a far better route to success. And the more transparent a service is about what it does, what data it collects, and for what purpose, the more easily will trust in it be built, and the larger the user base will grow.
58
WOMEN IN SECURITY MAGAZINE
As the world navigates through the COVID-19 pandemic, and as the lines between information and misinformation become ever more blurred, this has never been truer. Happily, there are some core ways that technologists and evangelists advocating for a more personalised and data-driven future, one built on full user consent, can draw on their experience to help increase consumer trust. Let’s explore some of their key insights. 1) Do what you say. This is the most important principle, and the simplest. Tell people what your app or service does, and then ensure it does nothing more, and nothing less. No dark patterns, nothing that is at all unclear, just the information required so
I N D U S T R Y
P E R S P E C T I V E S
that explicit and informed consent, as required by
5) Allow users to disappear. Putting individuals at
the EU’s GDPR data protection regulations and other
the centre of their data, and in control about what is
laws around the world, can be given whenever users
shared and with whom allows them to be forgotten,
choose to share their data. Key to this is ensuring that
if they so choose. This ability to withdraw consent
everything is clear and transparent so users actually
at any time is a legislated requirement in some
understand what they are agreeing to at every stage.
jurisdictions. While this isn’t possible in every single
Following this principle consistently and tracking
situation — some legacy data must be kept by law — it
back to it with every new feature or design tweak will
is an important consideration and should be built in
ensure you don’t go far wrong.
where possible.
2) Be transparent about data provenance and data flows. To build trust in data-sharing services it is essential to be transparent about how and where data is shared, and to enable individuals to retain control of the data they provide. Such transparency
KEEP IT SIMPLE, STUPID Going back to what I said at the beginning, the common thread running through all these steps is simplicity, which builds transparency, which morphs
is crucial to enable the proper functioning of services
into trust.
such as Covid health passes. It is also important to
There are, of course, other steps that can be taken:
have robust security measures in place to protect individuals’ data, and to be transparent about these. Individuals need to be convinced they have nothing to fear, and worthwhile benefits to gain, by sharing their data. 3) Build in positive actions. It is possible to build into an app or service functionality that makes users feel they are in control of what the app does, and more connected to it. A swipe, for example, is a more considered action than a button push, but still simple and straightforward to initiate and to understand. Certain situations — such as needing proof of Covid
data minimisation, not asking for data before it’s relevant, not asking for data unless there is a benefit for the user will help grow consumer trust in the security of data and in data sharing. But, fundamentally, it’s about putting in place a solid foundation of trust and building onto those foundation relationships that bring benefits for both sides. Getting the gathering, consent and flow of data right and keeping the associated processes simple and transparent will build consumer trust. So don’t be stupid — it really is just about keeping it simple.
vaccination or a negative PCR test to be able to board a flight — will push users in the direction of consent, but each individual must be able to withhold consent to the sharing of their data. 4) Be human-centric. In a nutshell, this means putting individuals at the centre of every aspect of their digital lives, including individual apps and
Digi.me www.linkedin.com/company/digime
www.digi.me twitter.com/digime
services. In Australia, the government is already moving in this direction, with a tender out for a
www.instagram.com/digidotme/
personal health data wallet that would enable individuals to hold their own data. Digi.me, for example, allows people to control and chose who they share it with, with explicit consent. This is critical. It keeps users connected to the service, and confident they are in control, which in turn builds trust and willingness to engage in data-sharing more broadly.
Australian Data Exchange/ID Exchange www.linkedin.com/company/australian-data-exchange/
www.australiandataexchange.com.au twitter.com/idexchange_me
WOMEN IN SECURITY MAGAZINE
59
SASENKA ABEYSOORIYA
THRIVING IN A POST-PANDEMIC FLEXIBLE WORKING ENVIRONMENT by Sasenka Abeysooriya, Senior Strategic Adviser at The University of Queensland (UQ)
At the start of the COVID-19 pandemic, no one knew
technology in place was arguably the easiest part of
what to expect. We were plunged into uncertainty,
implementing this new way of working.
borders were closing, social distancing was imposed, and toilet paper became a valuable asset. Forget about the Melbourne Cup, an address by Prime Minister Scott Morrison was what stopped the nation. In March 2020 lockdowns were progressively implemented by the Australian federal and state governments to restrict the movement of citizens and slow the spread of the novel coronavirus. Governments also mandated the closure of all ‘nonessential’ workplaces. Suddenly, if you still had a job, you were most likely working from home.
successful when people and process are at the forefront of planning. People are an organisation’s most important asset, and with any change people should be considered first. As medical experts work hard to keep us safe, leaders, managers and employees are having to adjust and learn new ways to work and live. There is a lot to process when work and living conditions are changing daily. Given the increased isolation in an uncertain world, it is equally important to recognise
While some organisations had offered the ability
that many of the risks for psychological injury will also
to work from home as a perk, it became the
be heightened during these times.
‘new normal’. However, getting there was not straightforward for many organisations. 2020 saw some incredible digital transformations to ensure everyone could safely connect to work environments and continue meeting online. This was an enormous change for most organisations, but getting the
60
I strongly believe any planned change will be most
WOMEN IN SECURITY MAGAZINE
Now, more than a year into the pandemic, leaders have another decision to make. Some organisations have moved back to the office at scale, some have opted for flexible working conditions, and some are still working from home.
I N D U S T R Y
P E R S P E C T I V E S
RESPONDING TO THE NEW NORMAL
especially during the pandemic whilst most of us
Some workplaces are starting to see a push to bring
were working from home.
employees back to the office, whether that be full time
Below are some factors I believe helped my team,
or in a hybrid remote/office mode. Before considering
and continue to help us thrive in a flexible work
a full-scale transition back to the office, it is essential
environment.
for leaders to understand the mental state of their changed efficiency and outcomes.
COMMUNICATION AND TRANSPARENCY
At the start of the pandemic, when faced with the
Trust and transparency have become popular
complexities and challenges associated with the
workplace expectations. Studies have shown
sudden shift to working from home, not all people
that genuine transparency strengthens working
were keen to leave the office environment. Now, more
relationships. Workplace transparency is not only
than a year later, some will be enthusiastic about
about sharing information; it has an enormous effect
returning to the office while, for various reasons,
on the overall morale of the environment, and how
others will not want to do so.
teams relate to the organisation.
Since mid to late 2020, staff in my organisation
We want to know what is happening around us. It is
have started to return to the office. I have adopted
important to communicate and share the good news,
a flexible work environment—and intend to maintain
the bad news, and the challenges ahead; especially
this moving forward—where my team come in a day
in times of uncertainty. Transparency is important to
or two each week and work from home the rest of the
maintain trust, to ensure rumours do not circulate,
week if they wish.
and to minimise anxiety. In our daily morning huddle
people, and reflect on how working from home has
Whilst the pandemic was challenging, it also highlighted how we could do better as a team. During the lockdown, my team transitioned to working
I take the opportunity to check in on the progress of our work and to give the team an update on the state of affairs.
completely from home, and put some major runs on
When leaders foster a culture of openness and
the board. Given the circumstances, morale was high
sharing, others will feel encouraged to share. After
and productivity was excellent.
all, communication isn’t a one-way street. Asking
Our organisation’s proactive approach to planning for the pandemic also included budget cuts. Our team responded by coming up with new and creative ideas to ensure we could still deliver maximum value for the organisation, with limited funding. An example of this was the launch of https://data.uq.edu.au, a website focusing on data and data literacy. It provides guidance on how to appropriately access and store data and make it easily accessible. The analytics showed this website to have been in high demand,
questions is a great way to encourage others to speak up and it demonstrates your humility: that you recognise your need to improve and learn. Asking questions could lead to process improvement opportunities and empower others to share new and innovative ideas.
FOCUS ON OUTCOMES, NOT ACTIVITIES I am obsessed with focusing on outcomes. My experience in running my own business has led
WOMEN IN SECURITY MAGAZINE
61
me to appreciate the time it takes to achieve an
happy marriage, employees will take care of you if you
outcome, and how this is more valuable than focusing
take care of them.
on outputs (or volume). It has been shown that organisations see positive results when their people are empowered to find ways to deliver value that suits them as individuals. This is not achieved through the micromanagement of people, which can lead to poor performances. We’ve seen a focus on outputs from some organisations during the pandemic, for example implementing monitoring software to track team activity. The process for achieving outcomes may take different forms. On one day this process might be boardroom negotiations that take hours; the next day it might be discussions over lunch and a beer. However, the outcomes of these different processes might be equally valuable.
Working remotely can bring isolation and create collaboration and communication challenges, if you are not proactively addressing the risk it creates. One way of maintaining engagement is through frequent one-on-one meetings. These check-in meetings have always been important, but should be prioritised when staff are working from home. My fortnightly catchups with my direct reports are open-ended conversations. Unlike status reports, they are times to connect, coach and, most importantly, opportunities to vent. I like to know if my staff are still enjoying work, what frustrates them, and if I can help them in any way. I don’t feel I have to hold these catchups in a meeting room. If we aren’t working from home, they tend to happen at the pub next door.
If teams are not focused on outcomes (value) but instead are focused on activities or outputs (volume),
FINAL THOUGHTS
they are spending time fulfilling the wrong metric.
These new working arrangements have afforded us
To me, when teams focus on activities, they are keeping busy, rather than maximising value to the organisation. In my daily huddles, I am generally concerned only with progress towards outcomes, and what I can do to support it. The key to staying focussed on outcomes is a shared vision, an understanding of the desired direction. To complement this vision, teams should be given
benefits we didn’t have before the pandemic. These include opportunities to hire staff from interstate without asking them to relocate, a previously difficult proposition. Flexible workers can be more effective. Employees who have opportunities to work flexibly have been shown to have greater job satisfaction and to be more engaged. This increases both their productivity and their sense of loyalty to the
structure in the form of parameters to operate within.
organisation.
These can include quality standards, operating
I am incredibly proud of my team, and I am very
practices and principles.
KEEPING YOUR TEAM ENGAGED AND MOTIVATED
grateful for their hard work, and how they have responded to much change. www.linkedin.com/in/sasenkaabeysooriya/
Whether a team is in the office or working remotely, it is important for it to be motivated and engaged.
twitter.com/sasenka89
Engaged employees are productive, not afraid to suggest ideas, and often end up exceeding expectations. The reason employees are engaged and motivated is very simple: they want to be. If they are inspired by the work they do, and if they believe in the organisation, they buy into the vision the organisation has set out. To keep teams and employees engaged and motivated, identify their pain points, issues and challenges. Enable employees by providing them with the tools and resources they need to succeed in their roles. Invest in their personal development and recognise them for their hard work. Like a partner in a
62
WOMEN IN SECURITY MAGAZINE
www.instagram.com/sasenkaabeysooriya/ www.sasenka.com s.abeysooriya@uq.edu.au
SAI K. HONIG
PIPELINES by Sai K. Honig, CISSP, CCSP Co-founder - New Zealand Network for Women in Security
In May this year, the cybersecurity world’s attention
Workforce Study, “data suggests that employment
focused on a pipeline in the US that had fallen victim
in the field now needs to grow by approximately 41
to a ransomware attack. The Colonial Pipeline is
percent in the US and by 89 percent worldwide in
8,850 kilometres long and can carry three million
order to fill the talent gap”. The challenge is to identify
barrels of fuel per day between Texas and New York.
and implement actions to fill that talent gap.
Colonial Pipeline confirmed it had paid a US$4.4M ransom to the cyber-criminal gang responsible for taking its pipeline offline. (It was later reported that $2.3M had been subsequently recovered by the FBI.) While we have learned much from this incident, we will probably be discussing how to prevent such attacks for a long time. However, there seems to be one pipeline that is rarely
There are some relatively easy steps that can be taken to bridge this gap. Many of these steps have been discussed at length, tools have been created and helpful groups formed to assist. Some of these steps are: •
they are inclusive.
discussed in cybersecurity: the staffing pipeline.
•
Look beyond computer science degrees for staff.
There is a lot of press about a global shortage of
•
Establish programs to assist parents returning to
cybersecurity professionals, but very little about building a pipeline of staff within organisations. By “pipeline” for cybersecurity, I mean graded levels of staff from entry level to senior level. Such a pipeline may even include students as interns. It provides a career pathway for cybersecurity professionals while encouraging them to remain within the organisation, and in cybersecurity careers. An effective career
the workforce. •
Have flexible working arrangements.
•
Look for people interested in changing careers.
•
Look for returning veterans.
•
Train or mentor early or mid-career professionals.
•
Consider partnering with organisations that train people outside of “traditional” schooling.
pipeline also builds cybersecurity knowledge within the cybersecurity team and within the organisation.
•
There is a worldwide shortage of cybersecurity
These are some suggestions, and the links are to
professionals. According to the (ISC)2 2020
64
Review job postings and hiring practices to see if
WOMEN IN SECURITY MAGAZINE
Hire graduate students/ interns.
organisations/resources that can help implement
I N D U S T R Y
P E R S P E C T I V E S
that may have an interest in cybersecurity, and include them in current and ongoing projects. Hiring is a process that often involves groups outside of cybersecurity, such as human resources. Individuals in such groups may need to be educated to look beyond the job description (or may even need help in creating job descriptions). I once spoke with a human resources director who was seeking an early-career cybersecurity professional (two years or less) who was also a Certified Information Systems Security Professional (CISSP). I had to inform her that a person requires a minimum of five years’ experience to become a CISSP.
them. Any of these actions can be used to build a pipeline, but success requires effort and commitment from the entire organisation, because these changes have to be implemented by the organisation. We have seen organisations build staffing pipelines for their product development teams. A similar approach should be applied to cybersecurity teams.
I was able to move into cybersecurity while working as a financial/operational auditor. A chance opportunity came up to look at implementing new IT systems. At first, I was unsure whether this was a good opportunity for me. But the further I progressed, the further I wanted to go. I was also encouraged by
Below is an example of one way to structure pipelines
hiring managers being willing to overlook the fact
within security. The idea being that there are levels
that I did not have a technical (eg computer science)
of security staff. Having levels would also encourage
background.
staff in other areas of the organisation to consider
At a time when more organisations find themselves,
working in security, knowing they would have a mentor to teach them the tools and processes. Levels would also encourage cross-training among security staff. In an organisation with multiple technology stacks staff could rotate between technology stacks to gain
victims of cybercrime, can we afford to limit options for hiring? Creating pipelines can help organisations do more in security and create a “security mindset”. Otherwise, like Colonial Pipeline, they may find themselves having to shut down.
further knowledge and experience. Technology stacks also provide a career path for those wanting to stay in cybersecurity. Many smaller organisations may not be able to implement a cybersecurity staffing pipeline. However,
www.linkedin.com/in/saihonig/
newzealandnetworkforwomeninsecurity.wordpress.com
there are simple ways to build an unofficial pipeline. Organisations can look to hiring interns for short term assignments. They can consider current staff
WOMEN IN SECURITY MAGAZINE
65
OWNING THE UNKNOWN: STUDYING AND WORKING IN THE FIELD OF CYBERSECURITY AND SOFTWARE ENGINEERING. by Laura Jiew, External Engagement at the School of Information Technology and Electrical Engineering, The University of Queensland.
Tomorrow’s female leaders in cybersecurity will start in the unlikeliest of places. Below is a story of three very different paths undertaken by femaleidentifying professionals from The University of Queensland (UQ). CURRENT STUDENT, MASTER OF INFORMATION TECHNOLOGY
a two-year work placement program at a local IT
Lynore Close is a proud
Missing home and family, Lynore decided to move
Wakka Wakka woman from
back to Brisbane in 2018 and continue her IT career.
Northern Queensland. Lynore chose to move to South Australia in her late teens after finishing high school early so she could travel and find herself. She landed a job as a farmworker in regional SA in the cold harsh winter, realised it wasn’t for her, and changed her direction. As luck would have it, a colleague had approached her about enrolling in an ICT traineeship program
66
company based in South Australia.
Shortly after moving, Lynore stumbled across a LinkedIn post on the partnership between Baidam Solutions and UQ. It inspired her to reach out to the CEO of Baidam Solutions, Phillip “Pip” Jenkinson. Lynore’s conversation with Pip eventually led her to securing a UQ and Baidam Solutions’ SANS Institute scholarship, and she is currently studying for a Master of Information Technology. Can you tell us more about Baidam Solutions and the role you have as a staff member there?
aimed at First Nations youth offered via TAFE SA.
I am Baidam’s first technical recruit and work as a
After completing this, Lynore was accepted into
Security Systems Engineer. The team at Baidam has
WOMEN IN SECURITY MAGAZINE
I N D U S T R Y
P E R S P E C T I V E S
been incredibly flexible by allowing me to pursue my
and robotics well into eleventh and twelfth grades
postgraduate studies and work at the same time.
when she enrolled in the International Baccalaureate
Although my role is technical, I have been encouraged
program, pursued the sciences, and cultivated her
by many of my colleagues at Baidam to cultivate my
research skills in the Theory of Knowledge component
leadership skills. I am particularly grateful to Pip and
of the program.
Craig Ford who have both been wonderful role models and mentors in the cybersecurity industry.
You’ve done some amazing stuff as a UQ student and recent alumnus. You were a Dean’s Global
Any advice you’d like to give to First Nations school
Scholarship recipient, a student ambassador, you
leavers and mature-aged students about pursuing a
tutor undergraduate students and you’ve been
higher degree in information technology?
involved with TEDxUQ, etc. Tell us what motivates
Reach out and don’t be afraid to develop a network. LinkedIn is a great place to start. Often, I’ve found that one opportunity leads to another. Another tip is to Google “ATSI” for any tertiary education institutions you may be interested in. Often you’ll find resources and opportunities tailored to First Nations students and prospective students.
you to be involved and a conscious contributor in your field of study? My parents always encouraged creativity when I was growing up and were always supportive of me pursuing new avenues and areas of interest. I have always been conscious about pushing myself: new challenges excite me.
Remember to maintain your connection to the
Because I had moved around frequently with my
country. Members of minority communities are more
family while growing up, trying new things was a
likely to aspire to a role if they can see someone like
coping mechanism, and I realised very early on that
themselves in that role. I hope to inspire the next
such a mindset opens new doors and leads to many
generation of First Nations women to take up roles in
new opportunities.
cybersecurity and be a good role model for them.
ALUMNUS, BACHELOR OF COMPUTER SOFTWARE ENGINEERING (HONOURS) Nandini Jain is a recent graduate and alumnus in Software Engineering. Originally from India, Nandini was a transfer
For example, being a scholar gave me the opportunity to apply for a student ambassadorship, which then gave me the opportunity to network and tutor current undergraduate UQ students. I’m always excited to take on new challenges. What are your long-term career aspirations? Any key takeaways from recently graduating and completing your degree?
student through The
In the long term, I’d love to be a tech entrepreneur and
Manipal Academy of Higher
have a personal interest in exploring user interfaces
Education (MAHE), which
and user experience. The idea of leveraging my
has strong links to the Faculty of Engineering and IT
software engineering background and applying it to
at UQ.
the digital transformation age excites me. Imparting
As a child, Nandini was adept and resilient to change
knowledge is something I’ve always enjoyed doing.
because her family had to move often owing to the
My biggest takeaway would be the value of
nature of her father’s work. In her teens, Nandini
continuous learning. Software engineering, and the
would often dream of studying abroad and her
STEM study areas in general, involve a lot of hard
interest was piqued in eighth grade when she was
work and may often feel like a hard slog, but with love
exposed to a Carnegie Mellon robotics program.
and genuine passion and an open mind, the sky’s the
With strong parental influence and encouragement,
limit.
Nandini continued to cultivate her interest in STEM
WOMEN IN SECURITY MAGAZINE
67
Any advice you’d like to give to school leavers,
service (DDoS) attacks on large-scale networks.
especially female-identifying ones, about pursuing
In early 2021, she took up her current fellowship
a higher degree in information technology or
position on-site at UQ, after a slight delay due to the
software engineering?
Covid-19 pandemic. She looks forward to the next
Head into it with a genuine passion, interest and
chapter of her career in Brisbane, Queensland.
understanding of the subject areas. Whenever the
Can you tell us more about why you chose the
going gets tough, take the time to reflect and realise
cybersecurity and software engineering pathway?
that you will learn much from the challenges you will come across.
To be honest, I landed in the field by accident when I was offered a place to study computer science after
Reach out and build a good support network. There’s
finishing high school. I soon discovered I had a knack
always so much you can learn from your peers. Never
for it. I was extremely fortunate that I had amazing
give up.
lecturers at university who inspired me to do well in my degree course.
STAFF, UQ CYBER SECURITY Dr Abigail Koay is a staff member at UQ and a research fellow in cybersecurity. Abigail hails from Malaysia and grew up in the state of Penang, known in British colonial times as “The Pearl of the
researcher, a cancer researcher to be specific. These days I often think that, even though I’m not directly involved in saving lives, cybersecurity is so pervasive I’m still able to make an indirect contribution. I think of it this way: the work I do contributes to the “health” of hospital equipment rather than the health of a person, and it matters.
Orient”. Growing up, she was mostly interested in
Your PhD research focused on the detection of
biology and chemistry and wanted to be a cancer or
distributed denial of service (DDoS) attacks on
medical research scientist.
large-scale networks. Tell us what motivated you to
After completing her high school education, Abigail
pursue this topic?
was offered a place in the Bachelor of Computer
At the time, DDoS was extremely topical in the
Science program at The University of Malaysia
information technology and computer science
Pahang (UMP) where she had an amazing course
community. Most folks will be familiar with the
lecturer in her undergraduate course. The experience
incident which knocked Spamhaus offline. The Xbox
reinforced her passion and interest in information
Live and Playstation attacks also made waves in the
technology and computer science. Another valuable
media.
feature of her undergraduate course at UMP was the incorporation of a Cisco CCNA certification as part of its Bachelor of Computer Science program. A CCNA certification validates skills and knowledge in computer networking fundamentals, IP connectivity and services, cybersecurity fundamentals, and automation and programmability. After working for a couple of years in Malaysia for well-known commercial entities including IBM and Vinx, Abigail went on to obtain a PhD in Engineering (Network Security) from Victoria University of Wellington in New Zealand. Her PhD research focused on the detection of distributed denial of
68
When I was young I wanted to be a medical
WOMEN IN SECURITY MAGAZINE
In addition to this, my primary supervisor’s expertise was in security while my PhD co-supervisor’s expertise was in AI. So combining both fields and my undergraduate background in networking for my PhD research topic made a lot of sense. What are your long-term career aspirations? Any key takeaways you’d like to impart to undergraduate and postgraduate students in the field? Like most early career researchers, I’d love to cultivate my research strength and help develop human application tools at the same time.
I N D U S T R Y
P E R S P E C T I V E S
To those who are new to the cybersecurity journey, my advice is: never give up and look for mentors and allies. Cybersecurity is such an integral part of current technology that opportunities will be boundless. Try and get involved in student societies or events that will allow you to develop and hone your technical skills. I highly recommend participating in capturing the flag challenges whenever the opportunity arises. Regardless of which aspect of cybersecurity you’re interested in, whether it be the technical or the compliance and governance side, cultivate your interests, keep going and don’t give up.
www.itee.uq.edu.au/cyber-security
twitter.com/UQSchoolITEE
Lynore www.linkedin.com/in/lyn-close/
Nandini www.linkedin.com/in/nandini-jain-23159a192/
Abigail www.linkedin.com/in/abigailkoay/
WOMEN IN SECURITY MAGAZINE
69
TAKING FEARLESS SECURE DEVELOPMENT EDUCATION TO THE WORLD by Kirstin McIntosh, Head of Partnerships at Cyrise
L
aura Bell is a founder in cohort 5
fast-moving, fast-growing organisations around the
of CyRise, the APAC cybersecurity
world. I also co-authored a book with O’Reilly, Agile
accelerator program funded by NTT
Application Security, and we established a good
Limited and Deakin University. Her
reputation.”
startup, SafeStack Academy, is the first NZ company in the CyRise portfolio.
hit in April. “Our customers, who were generally
SafeStack is a successful global cybersecurity
small and agile, went back into their shells and tried
education platform she runs from her home in
to preserve cash-flow,” Bell says. “We dropped 94
New Zealand, a home she shares with two young
percent of our revenue overnight. We’d always talked
daughters.
about reaching a wider audience, so we decided we
“I sort of accidentally got into software development at 16,” Bell says. “I needed a job and stumbled into an apprenticeship as a software developer.” She went on to gain a degree in computer science and artificial intelligence from the University of Wales, then to work for CERN in Switzerland on the Large Hadron Collider, and for the UK Government in counter-terrorism. She then moved to New Zealand and worked as a penetration tester for five years before starting her own company. “SafeStack originally started as a consultancy in 2014,” she says. “We were focused on helping
70
Things were going really well until 2020 when Covid
WOMEN IN SECURITY MAGAZINE
had a chance to do something bold.”
THE BIG PIVOT That bold move was to turn the SafeStack consultancy into a training provider. It did not happen overnight, but the business adapted rapidly. “We developed the first half of the product — security awareness training — and had a soft launch in July so we could iron out any kinks. Then launched the SafeStack Academy, which is specific training for development teams, in September,” Bell says.
I N D U S T R Y
P E R S P E C T I V E S
Through SafeStack, teams can get extra help without having extra specialists join them.” She says SafeStack has been overwhelmed by the positive customer response. It now has 44 customers in five countries, representing 1000 engineers and more than 5,000 learners. Today, SafeStack provides a community-centric online education platform that gives developers, testers and other roles in a business security training covering every stage of the software development lifecycle.
“Demand is high. People usually come for developer training, our core product, but once they see our style and approach, it gives us the opportunity to draw in more people to our security awareness training. This
“We bring together really high-quality, easy-to-navigate
enables us to raise security awareness for everyone,
learning paths alongside hands-on labs that allow
not just certain roles.”
learners to explore concepts they’re learning in fun, experimental ways.” Bell says.
A SAFER PLACE
She says SafeStack has developed a unique
The success of this more equitable approach to
community approach to cybersecurity training.
security training is underpinned by Bell’s worldview.
“SafeStack is a safe place. Development teams from
“I genuinely believe that everyone has the right to
all around the world can feel safe to say, ‘This is hard. What have you done, so we can learn from each other?’” SafeStack connects people with others unknown to them, Bell says. “A team’s problems are never unique. They’re shared by many teams across companies.
be safe online, no matter how big their budget is, or where they’re located,” she says. “Being safe online is a fundamental need. I’m on a mission to make that happen in a way that’s as accessible and suitable to as many different organisations and roles as possible.”
WOMEN IN SECURITY MAGAZINE
71
CULTURE FIRST AND TECHNOLOGY SECOND
If you’d like to see Laura Bell in action, she will be
In line with this approach the business tries to
Tuesday 17th August.
be gender-neutral. “We use mascots — animated
Tickets - live and livestream - are available on
characters — on the platform. None of them have an
Eventbrite https://www.eventbrite.com.au/e/cyrise-
identifiable gender. You can’t tell the genders apart.
demo-day-august-2021-tickets-154176168069
pitching at the CyRise Demo Day in Melbourne on
Everyone is equal.” Eight of SafeStack’s nine team members are women. “Our job adverts are intentionally inclusive, and
Laura Bell
structured to not exclude people who only hit 90
www.linkedin.com/in/lauradbell/
percent of the role requirements,” Bell says. twitter.com/lady_nerd
“We found that with really long role descriptions, incredible people self-select out, and don’t apply, because they think the one thing they can’t do means
SafeStack Academy
they can’t do the job.” www.linkedin.com/company/safestack/
SafeStack interviews, she says, speak to culture first and technology second. “We encourage self-reflection
twitter.com/safestack
at the interview, too.” The approach has helped the business create a
academy.safestack.io/
supportive environment and a team that is conscious about what it means to work in a diverse group, and
CyRise
able to communicate with a wide range of people. This, says Bell, is part of her vision for the company. “I like that we’re coming with a different voice, and creating opportunities for diverse groups and role models. Leading SafeStack is the hardest thing I’ve ever done, but in the process, I’ve also found strengths I didn’t know I had.”
72
WOMEN IN SECURITY MAGAZINE
www.linkedin.com/company/cyrise/
twitter.com/cyriseco www.linkedin.com/company/cyrise/
For more details, connect with SheLeadsTech Melbourne: https://oneintech.org/our-programs/sheleadstech/ https://www.linkedin.com/company/sheleadstech-melbourne For more details, connect with SheLeadsTech Melbourne: sheleadstech@isaca-melbourne.org.au https://oneintech.org/our-programs/sheleadstech/ Feel free to connect also with your local ISACA chapter. https://www.linkedin.com/company/sheleadstech-melbourne sheleadstech@isaca-melbourne.org.au
For more details, connect with SheLeadsTech Melbourne:
For more details, connect with SheLeadsTech Melbourne:
https://oneintech.org/our-programs/sheleadstech/
https://oneintech.org/our-programs/sheleadstech/
https://www.linkedin.com/company/sheleadstech-melbourne
https://www.linkedin.com/company/sheleadstech-melbourne
sheleadstech@isaca-melbourne.org.au sheleadstech@isaca-melbourne.org.au
Feel free to connect chapter. Feel free to connect alsoalso withwith youryour local local ISACAISACA chapter.
Image source: screenshot from the music video by JAY-Z performing 99 Problems. (C) 2004 Roc-A-Fella Records, LLC.
S M E L B O R P 9 9 T I GO N L U V A BUT E N O T ’ AIN by By Laura Jiew and Sean McIntyre from AusCERT
Ninety-nine problems but a vuln ain’t one
people understand that a cyber criminal and victim
If you’re having cyber problems, I feel bad for your
could look like anyone, including you and me?
SOC I got ninety-nine problems but a vuln ain’t one, hit us!
friends, neighbours even — about how cyber crime
Cheesy (revised) lyrics aside, I caught up with my
isn’t discriminatory and can happen to anyone.
colleague Sean McIntyre — information security
It’s great that the media draws attention to cyber-
analyst at AusCERT — to discuss our shared
related incidents and helps bring the topic to the
thoughts on the common misconception that
mainstream. People relate to examples like Nine
cyber criminals are “hooded/masked baddies”. We
Network or domain.com.au. However, I do think we
outlined some ways in which AusCERT, as a not-for-
can do better at the grassroots level. We should
profit security group, can help our members and the
start talking about cybersecurity with kids in schools
general public avoid falling victim to a cybercrime
and other groups, and avoid making “cyber” a scary
and/or incident.
topic. I think organisations like eSafety do some
Sean, it isn’t unusual for our community to think of
74
I think it is really important to talk to folks — family,
good work in this space.
cybersecurity in terms of tired cliches and common
You’ve been working at AusCERT for close
tropes. In your opinion, what can we do to help
to 18 months. In your opinion, and from your
WOMEN IN SECURITY MAGAZINE
I N D U S T R Y
P E R S P E C T I V E S
observations, what cybersecurity challenges are most often faced by our members, and how would you advise them to respond? My top three observed challenges, and my suggested responses, are as follows. •
Staying on top of the countless advisories, vulnerabilities and CVEs that come through daily. Identify all your infrastructure: systems, operating systems, patch levels, appliances, applications. This may sound elementary, but sometimes the concept of going back to basics is a great starting point. Jess Dodson, one of our keynote speakers at the AusCERT2021 conference, does a great job of this through
•
•
Domain impersonation or squatting, and brand protection. This one is particularly challenging. AusCERT would love to help members affected. However, we can get websites taken down only if they are used for malicious activity such as phishing or malware delivery. In cases where a brand is being impersonated, registrars and website hosts will request that the owner of the trademark contact them directly. Website contacts responsible for dealing with abuse issues can generally be found in the ‘whois’ info of a domain. Members can always reach out to the AusCERT team for assistance. We are happy to walk through the necessary steps with them.
her personal website. It’s definitely worth
You and I presented a case study on the AusCERT
checking out. When they have completed this
incident management service at the end of 2020.
audit AusCERT members can subscribe to the
Can you reiterate the key take-aways for our
appropriate AusCERT security bulletins through
readers?
the member portal function.
If you have not read the piece we did together on
Identifying business email compromise (BEC)
incident management, check it out on the AusCERT
attempts from what can be extremely confusing email headers, and taking appropriate action. BECs are a common scam. The ACCC recently
website. If you’re an AusCERT member, use our 24/7 incident hotline or email us at auscert@auscert.org.au for any
reported that payment redirection scams, also
cyber-related incidents.
known as business email compromise (BEC)
Where possible, implement the “Essential Eight”
scams, resulted in $128 million of losses in
as outlined by the Australian Cyber Security Centre
2020. The AusCERT team is always happy to
(ACSC). This protocol provides a baseline for
assist members with the analysis of phishing
cybersecurity incident mitigation. Implementing
email attempts and headers and will contact and
these strategies makes it much harder for
assist affected member organisations where
adversaries to compromise systems.
a BEC has occurred. Public agencies such as Scamwatch can also assist.
Thanks so much for the chat Sean!
AusCERT is a cyber emergency response team (CERT) based in Australia. We help members prevent, detect, respond to and mitigate cyber-based attacks. As a not-for-profit security group based at the University of Queensland, Australia, we deliver 24/7 service to members alongside a range of comprehensive tools to strengthen their cybersecurity strategy and posture. To find out more about our services, visit auscert.org.au
Resources https://www.esafety.gov.au/kids https://girl-germs.com/?p=2324 https://www.accc.gov.au/media-release/scammers-capitalise-on-pandemic-as-australians-lose-record-851-million-to-scams https://www.scamwatch.gov.au/types-of-scams https://www.auscert.org.au/blog/2020-11-06-case-study-incident-management https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-explained
WOMEN IN SECURITY MAGAZINE
75
CAROLYN CRANDALL
WHY TECHNICAL PROFICIENCY WON’T TAKE YOU TO THE TOP IN TODAY’S WORLD by Carolyn Crandall, CMO at Attivo Networks
Have you achieved career success in the
CHECK YOUR TECH THINKING
cybersecurity sphere and feel confident you could
That’s the good news. The less good news is that
handle more responsibility and a leadership position? Last year’s COVID crisis forced organisations to get
you up the career ladder.
serious about two things: digitally transforming their
Vital though it is for many operational roles, expert
operations to enable them to weather lockdowns and supply chain disruption; and protecting critical systems and sensitive data against the wave of malicious cyber activity that came hot on the heels of
knowledge is not what business leaders seek when determining who to tap on the shoulder for a higher position.
the coronavirus.
Rather, they’re looking for individuals who are capable
As enterprises evaluated their security postures and
decision makers from across the organisation.
sought reassurance they were not about to become the next ransomware statistic, the importance of
of discussing value and business benefits with other Being able to do so was less necessary in the past,
having stellar talent on staff became apparent.
when ICT and cybersecurity were seen as operational
With security now top of mind for businesses and
advantage they have become. Back in the day,
organisations in the Asia Pacific and around the world, there’s never been a better time for cyber professionals to step out of the shadows and into the spotlight.
76
technical proficiency alone won’t be enough to push
WOMEN IN SECURITY MAGAZINE
technologies, rather than the enablers of competitive business leaders would outline why they wanted something done and the techie types in the back office would handle the ‘how’.
I N D U S T R Y
P E R S P E C T I V E S
No longer. Today, ICT and security professionals
Close ties with the public relations team are also
who hope to move up the ranks need to be able to
essential, because, in the event of a serious cyber
talk about business outcomes. That means being
incident, public relations will play a vital role in
able to articulate the benefits that may result from
managing the messaging while you get on with
the adoption of recommended strategies and
running triage on the incident.
technologies, and the risks that will arise if action is not taken.
If you’re not willing to open a dialogue with your colleagues from sales, marketing, finance, operations
Admittedly, that can be somewhat challenging
and human resources, you’ll likely be elbowed aside
for aspiring CISO types, because investing in
by someone who is, even if their technical prowess is
cybersecurity products and practices does not always
less impressive than your own.
confer a direct business advantage. However, there are many benefits from running a secure enterprise,
BUILDING YOUR BRAND
and potentially, serious consequences from a data
Being in the running for senior positions also means
breach or malware attack. Technical leaders who can go beyond simply understanding industry benchmarks and risk profiles and articulate how innovation can be used to maximise service delivery, improve brand recognition
being visible. Public speaking is anathema for many women (and men), but putting your hand up for public speaking opportunities such as internal and customer presentations will raise your profile, and ensure you’re seen as a credible candidate when a key project or
and ensure customer satisfaction will elevate their
opportunity to advance arises.
value to their business and stand out from the crowd.
In the digital era, it’s easy to build your personal brand
CREATING CONNECTIONS ACROSS THE ENTERPRISE Strong communication skills are also a must-have for security stars on the rise. Introverts who prefer to sit in their offices, waiting to be consulted on matters pertinent to their sphere of influence might fulfil essential technical roles very competently, but they
via self-publishing. If you know your stuff and have interesting, well-founded opinions, making a video, blog or podcast is a great way to share them. Such initiatives will also give you something to talk about at that next performance review or job interview, when you’re selling your skills, or making your case for promotion.
are ill-suited to senior roles in 2021.
STEPPING UP
If you’re one such, it may be time to move forward.
In today’s digitally-driven commercial world there are
Given that cybersecurity now has an impact on every aspect of operations, the ability to interact with stakeholders, both internal and external, is essential. Fostering those connections allows you to be proactive. Being close to the marketing department,
opportunities aplenty for individuals who bring both technical skills and business acumen to the table. If you’re a woman in security with aspirations to advance, brushing up your business skills is likely to prove a very smart move.
for example, may enable you to highlight the risk of a privacy breach when shadow IT, in the form of an untested SaaS marketing program, is used to run the latest campaign.
www.linkedin.com/in/cacrandall/
twitter.com/ctcrandall
WOMEN IN SECURITY MAGAZINE
77
ADDRESSING WORKPLACE CULTURE IN THE CYBERSECURITY SECTOR by Laura Jiew, AWSN National Marketing & Social Media Lead
M
ost readers will know that AWSN is proud to be part of the CyberShift Alliance, a
industry? Workshop 2. What does workplace toxicity look like?
collaboration between ISACA
Workshop 3. What is the impact of toxicity on security
SheLeadsTech, FITT, CISO Lens,
teams, security posture, people’s careers and mental
AustCyber, the Australian Signals
health?
Directorate (ASD), (ISC)², the Australian Information Security Association (AISA), Day of the Month Club
Workshop 4. Should you speak out about toxicity? Why
(DOTM), EY Australia and Forrester Research. Its
and why not?
mission is to address culture change in the security
Workshop 5. What does a great security team culture
sector. The Alliance was born from two events: an International Women’s Day run jointly by AWSN and ISACA earlier this year titled “Don’t reward the brilliant jerk”, and the AustCyber “Culture Shock” event held during the 2020 Australian Cyber Week. In late July this year, the CyberShift Alliance hosted another, fully virtual event on “Toxic Workplace Cultures”, attended by more than two hundred people. Participants were divided into ten workshops, each covering a specific topic. Workshop 1. What do you see as the causes for toxicity in cybersecurity? Why is this an issue in our
look like? Workshop 6. How do you speak out about toxicity? What language, processes and other tools do you use? Workshop 7. What is the impact of toxicity on underrepresented minority groups? Workshop 8. How do you determine if it’s a toxic environment, imposter syndrome or a systematic business issue? Workshop 9. What is your responsibility to act when it’s a toxic situation? Workshop 10. What can you do about toxicity in security as an individual / leader / organisation? Below is a summary of the key take-aways from the
78
WOMEN IN SECURITY MAGAZINE
I N D U S T R Y
P E R S P E C T I V E S
“Toxic Workplace Cultures” event.
whether the organisation is worthy of such employees.
THE INABILITY TO SPEAK OUT ABOUT BAD BEHAVIOUR IN THE CYBERSECURITY INDUSTRY, AND THE FEAR OF DOING SO.
WHAT CAN BE DONE TO RESOLVE THE ISSUE?
Lead presenter, Jinan Budge, principal analyst serving security and risk professionals at Forrester Research, surveyed her professional network and found 65 percent of respondents agreeing that speaking out was “career suicide”. Most people are afraid to speak up about workplace-related problems, highlighting a fear of potential disciplinary action(s) if they do so.
POOR WORKPLACE CULTURE.
ORGANISATIONS Protect and value employees by having a code of ethics. Enforce mandatory leadership training covering topics such as bullying in the workplace, sexual harassment and misconduct, and set aside a budget to manage employees’ mental health and wellbeing. LEADERS Budge and her fellow panel members, Laura Lees, Jacqui Kernot and James Turner, provided some blunt advice for CISOs and security leaders who may have
This endemic problem in the cybersecurity sector
a toxic culture in their organisation: start by simply
[see “Beware the Brilliant Cybersecurity Jerk” article in
recognising the issue and naming it publicly instead
Edition 2 of the magazine] is preventing a sizeable pool
of ignoring it. “Empathy is about listening more than
of capable talent from joining the industry. It is also
speaking.“
causing a retention problem and hindering Australia from tackling cyber threats in the most inclusive, collab-
INDIVIDUALS
orative and, therefore, optimal way.
Listen harder and actively and try to embrace the ideas of fellow colleagues, especially if they differ from yours.
RECRUITING FOR FIT AND FOR PURPOSE.
At a bare minimum, be kind and choose to challenge if
When recruiting, employers should consider the skill-
The discussion around what toxic culture looks like in
sets of potential employees and whether they are the right fit for the organisation’s workplace culture, and
a situation feels uncomfortable or unjust.
practice and how individuals, leaders and organisations can address it was incredibly valuable. We hope everyone who joined in benefitted from it.
WOMEN IN SECURITY MAGAZINE
79
SOPHIA PACE
STARTUP OR LARGE CORPORATION? by Sophia Pace, Marketing Manager at Avertro
Fast-paced environment. Close-knit teams.
SME would have already implemented that decision
Uncertainty of what each day will bring. There are
and refined it based on results because they tend to
many factors potential candidates consider before
have fewer steps in the approval process. Such rapid
deciding to work for a startup or SME. But what gets
progress can motivate employees because they can
them over the line and keeps them working there?
witness their direct contribution to the organisation’s
We surveyed our staff and those at fellow startups to uncover the key factors determining such decisions.
LARGER IMPACT, LARGER CONTRIBUTION The lean nature of a startup team creates an environment where individual employees can often make a significant contribution to the business. In contrast to larger, more established companies, startups tend to have less structure and flatter
CAREER ADVANCEMENT OPPORTUNITIES The promise of career advancement in a startup is a compelling incentive for new hires and current employees. There tend to be many opportunities, both vertically and horizontally. Employees gain experience across different roles instead of sticking to one specialisation.
hierarchies. This means each employee is highly
Self-starters are likely to be more attracted to
visible, and the impact of their work is more readily
the greater autonomy, responsibility and scope
apparent than if they were in a more specialised
of experiences available in a short time than to a
position.
single job role spanning several years in a larger
Because the organisation is leaner and more agile,
organisation.
employees can adapt and respond to new learnings
If startups want to attract and hold on to skilled
faster than in a large organisation, where bureaucracy
employees, they must give them opportunities to
can delay changes. In the time it typically takes a
grow.
large organisation to reach a decision, a startup or an
80
success.
WOMEN IN SECURITY MAGAZINE
I N D U S T R Y
P E R S P E C T I V E S
Here at Avertro, many of our employees are hired in one role but grow into others. Working for a small business often means employees can forge their own unique path to advancement. This tends to be more attractive for highly motivated self-starters than the prescribed, uniform, constrained way to advance seniority within a larger organisation.
“The promise of career advancement in a startup is a compelling incentive for new hires and current employees. There tend to be many opportunities, both vertically and horizontally. Employees gain experience across different roles instead of sticking to one specialisation.”
OPPORTUNITIES TO GROW AND GAIN EXPERTISE
the norm because they want to change things for
Many startups will give their employees much more
employees can align themselves with gives their role
responsibility than more established companies. This
a purpose.
is because startups often cannot afford to hire several employees and give each a different and finite set of responsibilities within a department. Startups often hire their employees based on a core skillset and give each person a more prominent role because they have fewer employees than large organisations. This can be a significant benefit, especially for new professionals, because it offers them ample opportunity to learn things they would likely not be exposed to in a corporate or more established organisation.
SMALLER TEAMS AND CLOSER CONNECTION TO LEADERS Founders and employees of startups often work together, which means employees have direct access to the people behind the organisation and will be able to learn from them every step of the way.
SHARED VALUES
the better. Having a clear organisational vision that
Startup employees typically earn less base salary than workers at big companies, and they may have to work harder. But the intangible benefits can be more rewarding in the long term. Many startup companies have very flexible and casual workplace cultures. Best of all, if the organisation becomes successful, employees can reap the benefits directly. Being instrumental to the success of a startup could lead to an executive position and employee stock options, allowing an employee to own a piece of the company. Beyond the personal satisfaction of helping build something great, being core to the success of a company’s journey helps establish an employee’s professional legacy; something very few people will ever be able to achieve at the typical large, established organisation.
Avertro
Employees attracted to working for startups and www.linkedin.com/company/avertro/
SMEs are increasingly driven by their desire to align themselves with brands that share their values. These
twitter.com/AvertroSecurity
individuals want to know their work matters and aligns with their values.
www.avertro.com/
A startup begins with an idea for a solution to a set of problems. But it takes a team of motivated, talented
Sophia
individuals to harness that idea and build it into a sustainable business. Successful startups challenge
www.linkedin.com/in/sophia-pace-29656530/
WOMEN IN SECURITY MAGAZINE
81
SOLVING THE PIPELINE PROBLEM by David Braue
A STRONG PIPELINE OF CYBER SKILLS HAS NEVER BEEN MORE IMPORTANT But with students nonplussed about cyber, it’s up to CSOs to get creative
D
espite years of effort to improve
and mathematics – all traditional pathways to
the representation of women in
computer science and cybersecurity careers.
STEM areas, declining participation has serious implications for the cybersecurity industry’s ability to build and sustain a pipeline of talent to
meet rising demand. That decline – as measured by the 2021 STEM Equity Monitor – noted the number of women in STEMrelated occupations had dropped by 1% between 2019 and 2020, while the number of men increased by 1% during the same time.
weren’t interested in STEM subjects, while 53% said STEM subjects were too hard for them and 48% and 47% said they weren’t very good at maths or science, respectively. Particularly concerning for the cybersecurity pipeline was the finding that 74% of girls believe STEM subjects are not related to the career they want – suggesting that STEM in general, and cybersecurity in particular, simply have not managed to click with
Complementary numbers, obtained during
girls in the way that gender-equality advocates have
YouthSight’s 2019-2020 Youth in STEM survey,
hoped.
highlighted the even bigger problem: Australian school-age girls, it seems, are simply less interested than boys in areas including technology, engineering,
82
Fully 68% of girls aged 12 to 25 said they simply
WOMEN IN SECURITY MAGAZINE
The only STEM area where girls showed similar interest to boys was in the study of science – and this, it turns out, may be the secret to bringing
F E AT U R E
equality to the cybersecurity pipeline through far less direct means. Conversion of people in other fields has become a rallying cry for cybersecurity recruiters, who are getting creative as they seek a way to work around cyber’s failure to launch among school children.
“I was in biotechnology, because I’ve always been fascinated with the future – and so it was something that attracted me quite a lot. I got very interested in how we could potentially genetically engineer ourselves into the future.” - Pip Wyrdeman, PwC Australia
Having graduated from university with a Bachelor of Applied Science in biotechnology and administration and a graduate diploma in management science, Pip Wyrdeman knows what it’s like to enter cybersecurity from the outside – and she’s encouraging others to take the plunge. Having recently joined PwC Australia’s Cybersecurity and Digital Trust team, Wyrdeman is building on a career that includes roles in Department of Defence ICT policy and as a senior cybersecurity policy advisor within the Department of the Prime Minister and Cabinet – but she did not, she is quick to point out, initially train in cyber. “I was in biotechnology,” she told WiSM, “because I’ve always been fascinated with the future – and so it was something that attracted me quite a lot. I got very interested in how we could potentially genetically engineer ourselves into the future.” Over the course of years of consulting and policy work – and some deep dives into digital transformations – Wyrdeman’s interest refocused on
WOMEN IN SECURITY MAGAZINE
83
the intersection between what she called “what it is to be human and our frantic drive to digitize and virtualize our world”. “That’s what’s really exciting about cybersecurity at
(ACCSE) program – aiming to bring students and postgraduates into cyber – and the P-TECH public-private partnership for students, and there is no lack of opportunities for students that are interested in cyber.
the moment,” she said, “is that it is the fundamental
Students aren’t the only ones getting targeted
thing that allows us to have a future that is digitally
support to stimulate their interest in cybersecurity,
driven. It gives us the opportunity to grow ourselves
however: programs like WithYouWithMe and the
and our systems into the future.”
ADF Cyber Gap Program are creating new links between cyber careers and military service, while
DEMAND-SIDE SUPPLY VS SUPPLYSIDE DEMAND
private-sector programs are welcoming interested
For Wyrdeman and the many other successful women
Yet such programs will only do so much to improve
who have built successful and rewarding careers in cyber, continuing difficulties in engaging with schoolage girls represent a bugbear for efforts to bolster the industry’s pipeline. It’s not for lack of trying. Programs such as the Schools Cyber Security Challenges work to raise awareness by gamifying cybersecurity challenges, while the Australian Signals Directorate (ASD) has launched a range of initiatives including ASD apprenticeships, the ASD CyberExp incidentresponse program, ICT Masterclass for Year 11 and 12 students, and networks such as the Girls’ Programming Network (GPN) for year 4 to 12 girls. Industry-development organisation AustCyber has been working to raise awareness of the varied paths into the industry – offering practical tips for students with PwC, in-school career presentations and speed-networking events with Data61’s Ribit while pushing the message that an IT background is not a prerequisite for a career in cybersecurity. Cyber, the firm is telling all who will listen, offers “diverse and rewarding” career paths available for anyone who is a persistent, perceptive, inquisitive, continuous learner with good communication skills – a point echoed as organisations like Optus and Services Australia joined the clarion call with programs to reach out to Year 12 students. Throw in the support of government initiatives like the Academic Centres of Cyber Security Excellence
84
WOMEN IN SECURITY MAGAZINE
people from all manner of other careers. the diversity of skills and candidates coming down the cyber pipeline, warned Dr Ronda Zelezny-Green, co-founder and director of consulting firm Panoply Digital. “One of the main reasons we are not realizing a faster pace of change in this area is because too much of the activity surrounding gender equality in IT focuses on one-off gimmicks and bandaid solutions that can be spotlighted in the press,” she said, “instead of focusing attention on female employees and the actions that will truly make a sustained difference in their professional lives.” Facing a long-running drought of cyber skills, Gartner research director David Gregory, advises CSOs to “expand recruiting to non-traditional sources” in an effort to boost numbers – with underrepresented groups representing a “potentially massive pool of untapped talent”. Reaching this pool requires looking outside of conventional recruitment processes, he advises, “tapping hidden pipelines” by perusing personal LinkedIn networks or promoting employee referrals. Consider how jobs are being advertised, particularly in terms of whether a particular role actually requires particular certifications. And map out clear career plans for the different roles within your cyber organisation, so that you can have clear and productive discussions with candidates about the
F E AT U R E
long-term opportunities a job with your company will provide. “Know and think about which functions are most important to your organisation,” Gregory said, “so they can match the skills you require.”
CONSIDER ALL THE ANGLES PwC’s Wyrdeman agreed, noting that there are two broad groups of employees that must be catered
deep physical, engineering and mathematics skills “who comprehend at that really deep scientific level how systems work, how data works, how information works.” Many of those potential cyber experts are women working in other fields – and many of them are quite happy where they are. But as the cyber industry continues to push its messaging hard, efforts to build a more flexible and extensive pipeline will necessarily involve greater representation of women with non-cyber and non-IT qualifications. The latest Women in Tech report from security firm
for within the cybersecurity pipeline. These include technical staff – who have specific degrees or certifications that are required to perform a required security function – and “everybody else”, as she puts it. “This includes quite a lot of people,” she explained, including people who are playing in the risk space and look at digital risk management; people in the data space who consider data, trust and privacy; and people weighing in on the legal and regulatory issues around cybersecurity. “The upside of cyber being a team sport is for any given problem, you need to approach it from multiple different angles,” Wyrdeman said. “Outside of targeting specific technical skill sets, one of the ways [to fill the pipeline] is to go out and start looking for people who have the right mindset – without actually
Kaspersky highlighted the magnitude of the problem – and the promise of better opportunities for women moving forward. Fully 56% of female respondents said that gender equality has improved in their organisation within the past two years, COVID-era remote working proving particularly beneficial for women who have been able to engage with cyber careers better than they could in the past. Time will tell whether initiatives targeted at students eventually gain more traction, or whether girls who are uninterested in STEM as students only end up coming into the industry through more circuitous paths, as so many have done. As CSOs face up to the need to continue developing a skills pipeline from both inside and outside the organisation, the key to success is, ultimately,
asking for cyber-specific anything.”
flexibility.
“There are a lot of people out there who wouldn’t see
“It comes back to this balance piece,” PwC’s
themselves as having capabilities that fit into what somebody might need to help them do in a job,” she added. Yet filling the pipeline isn’t only about luring nontechnical people: noting the increasing threat posed by hard-sciences fields like quantum computing, Wyrdeman said, there is also a role for people with
Wyrdeman said. “There are so many different skill sets and so many different ways that we need to think about this problem, depending on what you’re trying to achieve and where in the balance you sit.” “We’re at one of those moments in history where there is no better time to get involved. “There are so many opportunities of so many different kinds.”
WOMEN IN SECURITY MAGAZINE
85
DEEPTHI BHUSHAN
HOW COMPANIES CAN KEEP WOMEN IN CYBER ENGAGED AND MOTIVATED IN 2021 by Deepthi Bhushan, R&D Program Manager, FirstWave Cloud Technology
Only a couple of months ago many Australians were
to enable more flexible ways of working, with large
talking about the pandemic being ‘over’ and planning
portions of the workforce willing to leave their jobs if
how to continue doing business and running their
working from home was not offered as an ongoing
lives in the ‘new normal’.
option.
Today, we know this to be far from the truth. There
This pressure is still on employers, but during some
remain many unknowns: how the coronavirus is
lockdowns employers would have been dealt a
mutating; how vaccines can be rolled out across the
$10,000 fine from the government if a work from
country and all demographics; how government-led
home arrangement for staff was not delivered. And
decisions such as lockdowns will impact jobs and the
we have seen employees from a broad range of
economy. However, there are a few things we know
industries only too willing to report their employers
for sure after almost two years of the pandemic.
to the authorities if they were not following the new
We know there has been a permanent shift in how
86
regulations.
employees engage with their work and how they are
These drastic shifts led to thousands of Australians
motivated by their employers. We know there has
re-defining what a good workplace meant to them,
been a consequent transformation in how companies
and the result was what some are calling The Great
hire, engage and retain their staff. This time last year,
Resignation, where employees in droves left their jobs
businesses were under workforce-driven pressure
or changed employers for better working conditions.
WOMEN IN SECURITY MAGAZINE
I N D U S T R Y
P E R S P E C T I V E S
We know such seismic changes in workplaces can
them in their jobs, while a US study found 71 percent
have significant cultural, financial and operational
of IT decision-makers believe communication and
impacts, and that these have driven more workplaces
collaboration tools have made work more complex.
to re-assess the perks they offer.
This is on top of Zoom fatigue and the virtual
But for women in the cybersecurity sector, what really matters?
exhaustion experienced by everyone who has had to work remotely. Clearly, we can’t revert to pre-pandemic ways of
REDEFINING COLLABORATION AND TEAMWORK
working, nor can we simply throw technology at the
There is a range of seemingly conflicting challenges
the coming months. There needs to be an employee-
for employers investing in creating collaborative and team-oriented environments. Most business leaders are aware that the right mix of minds and ideas can lead to real innovation and creativity. However, we
challenge of keeping staff on board and engaged in centred approach to team building activities. Rather than creating blanket rules and initiatives for all staff, employers need to ensure they are truly listening to what employees want when it comes to team get-
have also learned from the pandemic that returning to
togethers online and offline.
the office, or re-creating an office environment, can be
Furthermore, when new tools and technologies are
harmful and produce further barriers to realising these outcomes. Open-plan offices, in particular, have been found to increase stress levels. And noise around a workstation can create significant distractions and frustrations. Furthermore, technology has been called out as a double-edged sword for driving effective
introduced, rather than simply investing in these to increase efficiency, employers need to consider the training, growth and learning opportunities. Many cyber and tech experts are leaving jobs for opportunities that enable them to explore new field. So companies need to take a proactive approach to offering these opportunities as part of employees’
collaboration. On the one hand, 68 percent of
day-to-day experiences rather than as one-offs.
Australian workers believe greater technology will help
Upskilling staff internally not only keeps them
WOMEN IN SECURITY MAGAZINE
87
engaged and more likely to stick with their current employer, but also means they can apply their skills and capabilities immediately to the same company, rather than taking these to a competitor.
FLEXIBILITY, CONTROL AND INCLUSION NEED TO BE FOUNDATIONAL Too often, tech companies are claiming flexible work schedules, control over career, and inclusive teams as ‘perks’ of the job. In 2021, women — particularly women in the fast-changing and high-demand cybersecurity sector — want and expect more. Rather than being additional benefits, these aspects of a job should today be the foundations of a company’s culture. To genuinely boost motivation and engagement levels, companies need to do much more to stand out, including: • Childcare: Companies need to start putting their money where their mouth is when it comes to supporting working mothers. As well as creating supportive work environments for mums who may have different schedules or last-minute changes to availability, there should also be parental support in the form of allowing mothers to visit their children for feeding, and financial support for childcare, medical and dental care for families. • Merit that matters: We all know the stats around unconscious bias and how this bias impacts career paths, despite many executives’ beliefs that they are acting, promoting and hiring based on ‘merit’. Unfortunately, unconscious bias training programs aren’t the solution, and could in fact be making pre-existing inequalities worse. To drive real change, workplaces need a complete shake-up. We need to give women the power to dictate their own career paths. We need to ensure they are consulted and heard in meetings, and invited to meetings where product design is debated so they can bring different perspectives. And we need to recruit and promote women who can do the job rather than only those who seem able to ‘fit in’. The cyber and tech skills shortages, combined with the ongoing challenges of accessing international
88
WOMEN IN SECURITY MAGAZINE
talent pools as a result of travel restrictions, will continue to put a strain on companies looking for the best talent, and on those wanting to keep that talent from moving to a competitor. This year employers need to wake up to the very real consequences they could face from droves of employees — particularly women who we know are in high demand, though often in short supply — leaving their businesses during times of ongoing change when innovative thinking is necessary. Now is the time to abandon the rule book and reliance on traditional methods for pumping up workplace motivation, and start writing a new directory for genuinely getting the most out of employees, and empowering them to get the most out of their work and workplaces. www.linkedin.com/in/deepthibn
www.firstwavecloud.com/ www.instagram.com/deepthibn/ www.facebook.com/deepthibn
“If you want to go fast, go alone. If you want to go far, go together.”
Partner with us In today’s ever-competitive world, Source2Create understands that sometimes you have to perfect what you can and let others take care of the rest, which we see is the way of the future. No skill is too big or too small. Are you an amateur photographer interested in growing your portfolio? Do you enjoy Graphic Design in your spare time? Are you interested in growing your speaking range? Visit our partner portal to see all the ways you could partner with us and grow your potential or even open a side-hustle.
VISIT OUR PARTNER PORTAL TODAY
KAREN STEPHENS Karen is CEO and co-founder of BCyber, an agile innovative group who works with SMEs to protect and grow their business by addressing their cybersecurity and governance risk gaps by demystifying the technical.
C O L U M N
Surviving a breach: step one - be prepared “We’ve been hacked” are not words you want to
or legal advice? If the answer is yes, are they
hear on Christmas Eve or the last day before a long
on a retainer? And do you have all their contact
weekend, or ever (it’s called strategic timing). And
details?
with your files being encrypted at between 6,000 and 10,000 files per minute, time is not on your side.
4. Communication: How do you plan to communicate to the team, your staff and your
The time to plan how you react to a ransomware
clients if all your systems are down, ie there is no
attack is not after it has happened, but beforehand.
VoIP, email, Teams, website, etc?
People need time to think, brainstorm ideas and agree on actions and roles. These are not activities you want to undertake mid ransomware attack. You need a controlled, practiced response, and you can mount such a response only if you have time: time to plan, implement and practice. Here are six ideas to get you started when you are planning your attack response. NOTE: this is not an exhaustive list, I am sure you can come up with many more ideas.
5. The Insurer: One of the first calls should be to your insurer (if you have insurance). Do you know who to call? And who is going to be doing the calling? Does your breach response plan meet the requirements set out in your insurance policy? 6. Desktop Exercise: Have you practiced what you will do in the event of a breach? Have you had everyone in the same room (or teleconference) and walked through your breach action plan with them?
1. The Dream Team: Who is going to be involved in spearheading the response? If you’re an SME it will be a combination of internal and external people. Do all team members know their roles and do you have the contact details of all members? Who is to lead and coordinate your response? 2. Important Documents: How do you intend to access your Disaster Recovery Plans, your Continuity or Contingency Plans when all your systems are down? And are they accessible by all team members all the time? 3. External Support: Many SMEs have limited internal technology support so, outsource their technology to external providers. Do you know what support they provide? Does it need to be supplemented by specialist support and/
90
WOMEN IN SECURITY MAGAZINE
www.linkedin.com/in/karen-stephens-bcyber/ www.bcyber.com.au karen@bcyber.com.au twitter.com/bcyber2 youtube.bcyber.com.au/2mux
EXPRESSION OF INTEREST SPONSORSHIP Source2Create is thrilled to announce the 2021 Australian Women in Security Awards. This hybrid event will be a glamorous Gala Awards evening based in Sydney. We will be welcoming our guests in person as well as via live stream. To be a part of this energetic initiative register your interest today for sponsorship opportunities.
Deadline for sponsorships: 20th October
I’M INTERESTED!
JOIN OUR SPONSORS
TECHNOLOGY PERSPECTIVES
CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2
C O L U M N
The Big Bad Wolf Cybersecurity is a complicated topic. Many people,
So along came our big bad wolf, our malicious actor.
including myself, try to explain it in many different
He looked and he tested. He poked and prodded.
ways, but fail to get the message across. Would it
This one wouldn’t be easy to break but he huffed
be easier to use age-old nursery rhymes or classic
and he puffed. He huffed and he puffed. He huffed
children’s stories to help explain cybersecurity? Let’s
and he puffed but he could not get in. The three little
give it a try.
pigs together had built a strong system, but it was
The story Three Little Pigs and the Big Bad Wolf is a perfect fit for cybersecurity. Think about it for a
not perfect and there was a chance the big bad wolf would still be able to get in.
moment. We have the three little security pigs and
However, they are prepared. They have tested and
the big bad wolf who is our malicious actor. The
simulated all types of scenarios. They are ready for
first little pig built a house from straw: a very basic
the day the wolf does get in, and until then they will
network with no antivirus, no firewall and just an
update and test. They will train and improve. If Lady
open network. The big bad wolf came along and he
Luck is on their side they will be able to fight off the
huffed and he puffed and he blew the walls in on this
attacks and live to keep fighting for another glorious
very unprotected network, owning and encrypting the
day.
systems with just a few minutes work.
I know it’s an interesting adaption of the good old
The second little pig built his home out of timber: a
classic, but I think you can all see what I am getting
nice strong firewall, some basic antivirus and some
at here: cover the basics and never stop testing and
occasional updates with a basic backup plan. He
improving. That is the key to success in this digital
didn’t monitor the network, test his backups or do
war. We may not win every battle. We may even lose
patching. He didn’t do any staff training or any of
the war, but we can make it hard for that big bad wolf.
what he called fancy stuff. Along came the big bad
And, with luck, we can even come out the other side
wolf (our malicious actor). He huffed and he puffed:
stronger than before.
no movement. He huffed and he puffed. He huffed and he puffed. With one big puff he hacked right
The End…
through little pig’s protections, and gained ownership of his network. He held the little pig’s data to ransom, but the poor little pig could not pay and had to shut
www.linkedin.com/in/craig-ford-cybersecurity
down his timber business. Now the third little pig, he was a smart fella. He put in firewalls, advanced endpoint detection and response,
www.amazon.com/Craig-Ford/e/B07XNMMV8R www.facebook.com/pg/AHackerIam/
along with the latest monitoring, patching and backup systems. He tested and improved any time he could.
twitter.com/CraigFord_Cyber
He also hired the other two little pigs. Together they trained and learnt from the previous events to ensure they would be as prepared for an attack as any good pig could be.
WOMEN IN SECURITY MAGAZINE
93
QUEEN A AIGBEFO
IN AN ORCHESTRA THE WHOLE IS GREATER THAN THE SUM OF THE PARTS by Queen A Aigbefo, Research student, Macquarie University
An orchestra is a group of instrumentalists, but more
and objectives. Enter the Chief Information Security
specifically, a group that includes string, woodwind,
Officer (CISO), aka the conductor.
brass and percussion sections, playing classical music in perfect unison and harmony. However, one individual binds this group of musicians together: The Conductor.
of principals - the lead instrumentalists of each section - to carry the information they receive and put it in the context of their sections. In a business, the
The conductor interprets the music score,
CISO needs principals to help decode the strategies,
communicates with the musicians in each section,
policies, and procedures into biteable chunks to
and inspires them to perform their best work using
enable employees to defend the organisation’s
specific signals: eye contacts and standardised hand
information assets.
gestures, often with a baton.
Unfortunately, in the security context, there are some
Why do we need a conductor? After all, 18th
unrealistic expectations imposed on the office of
century orchestras were led by composers or
the CISO. The assumption may be that the CISO
concertmasters. Today’s orchestra is sometimes
is “superhuman” and by virtue of the
made up of 100+ musicians. While it may be relatively
title, can solve the business security
easy for a group of 20 musicians to play in harmony
problems. (But I digress.)
without a conductor, this may not be possible with a larger diverse group of instrumentalists.
What makes the orchestra tick? Short answer: different instruments playing
Let us recreate this picture in the context of security.
in tune and in harmony to make
The orchestra is the organisation with its various
beautiful music.
units and departments, all functioning to serve clients and customers and achieve the business’ goals
94
In an orchestra, the conductor requires the assistance
WOMEN IN SECURITY MAGAZINE
The equivalent components needed for successful security were
T E C H N O L O G Y
P E R S P E C T I V E S
identified in the publisher’s foreword to issue three of
comes to ensuring the security of organisational
Women in Security: “diversity + inclusion + culture =
information assets. A malicious attacker only needs
real value”.
to be successful once to compromise the entire
Diversity is what makes security tick. Decades ago, information technology (IT) departments often housed many like-minded folks with somewhat similar skills or training in the implementation of security countermeasures: like firefighters either constantly putting out security fires or defending the network from malicious attackers. Today’s security practitioners know their effort could fail if a single
organisation.
PLAY TO YOUR STRENGTHS. The orchestra is strategically arranged such that each instrument complements the others. Imagine a bass trombone right in front of the conductor. Not only would the conductor develop a headache before the end of the concert, but the trombone would also
user is socially engineered to open the proverbial
drown out the other instruments in the orchestra.
“front door” and let an attacker into the network. A
The balance between all the instruments in the
much more diverse set of skills is needed to educate users and counter such threats.
DIVERSITY REMAINS A CRUCIAL COMPONENT. The conductor may have the skill to direct the
orchestra plays a big role and is evident in the final output. In implementing security countermeasures, organisations need to play to their strengths. A onesize-fits-all approach to security, such as off-the-shelf security measures, will not suffice in the current threat landscape and post-pandemic hybrid workplace.
orchestra and the understanding and knowledge to interpret the score and deliver a memorable
MAURICE RAVEL’S BOLÉRO.
performance. However, without the orchestra, a
I love classical music. One piece of music that helps
conductor would be like a mime performer: making hand gestures, expressions and movements in total silence.
illustrate my point is Maurice Ravel’s Boléro. Boléro was written for a large orchestra but starts with a single instrument. More instruments are gradually
The CISO needs support from all members of a diverse ‘orchestra’: the Board and, most notably, the buy-in and cooperation of the various departments and employees, irrespective of their technical or non-
added, and the work slowly builds to its cacophonous climax while the percussionist maintains an unwavering tempo throughout the piece. A perfect example of how diversity and close cooperation create
technical expertise, with varying levels of education
something awesome.
and skill performing numerous tasks.
In an orchestra, the conductor has a strong influence
Just as the principal of each section in an orchestra oversees the instrumentalists in that section, the CISO will require “section principals” to translate for employees the complexities and ambiguities found in security processes and procedures
and needs an excellent ear to detect even minimal differences in the instrumentalists’ playing. The CISO may be one individual but needs to strategically understand, harness, and tap into the strength of diversity to make the whole greater than the sum of the parts.
to employees. No one department or section is greater than the other when it
www.linkedin.com/in/queenaigbefo/ twitter.com/queenaigbefo
WOMEN IN SECURITY MAGAZINE
95
MARISE ALPHONSO
RANSOMWARE IS RIFE HOW WILL WE WIN? by Marise Alphonso, Information Security Lead at Infoxchange Ransomware, a malicious software that encrypts
JBS Foods paid $14.2 million9 to end the cyber attack
data and prevents access until a ransom is paid, is
that impacted its operations around the world. It is
a growing cybercrime business model: the cost of
unknown whether a ransom was paid in the other
ransomware attacks in Australia in 2019 was around
cases.10
$1billion.1 Ransomware was the third most common data breach in those analysed for the 2021 Verizon Data Breach Investigations Report,2 and the report said threat actors exfiltrated data prior to encrypting it. Exfiltration provides an alternate revenue stream for these actors: they threaten to publish data if ransoms are not paid. This could cause reputational damage or loss of competitive advantage to an organisation, depending upon the data acquired.
can do to protect themselves from ransomware has been well publicised,11 12 and discussed at length in the security community, but probably not at senior leadership and board level within organisations. While this advice advocates extremely important security measures—such as ensuring systems and software are kept up to date, data backups are performed and tested, and employees are trained on how to
According to the Australian Cyber Security Centre
recognise phishing emails—these are far from being
(ACSC), ransomware attacks against Australian
the comprehensive solution needed to counter
entities have increased significantly since the 2017
ransomware attacks.
WannaCry incident3 4. 2021 incidents include:
There are calls in Australia13 and other countries
March: Nine Network unable to televise news and
such as the US14 for government intervention
produce newspapers.5
at a national and international level to combat
April: Uniting Care Queensland hospitals resorted to paper-based processes due to systems being inaccessible.6 June: JBS Foods, the world’s largest meat supplier, had the operations of 47 facilities in Australia affected.7 July: Kaseya, a provider of remote monitoring
this threat. In late 2020, the US Office of Foreign Assets Control (OFAC) advised15 that ransomware payments made to malicious cyber actors on its list of sanctioned persons and entities could be used to fund activities that could compromise the national security and foreign policy objectives of the US.16 OFAC recommended victims of ransomware contact government agencies for assistance rather than
and management software, had its software
paying the ransom.
compromised, impacting the operations of 1500
In Australia, the ACSC advice is not to pay the
organisations using the software.8
96
The cybersecurity advice on what organisations
WOMEN IN SECURITY MAGAZINE
ransom because such payouts could be used to
T E C H N O L O G Y
P E R S P E C T I V E S
propagate further attacks, but the full extent of incidents and ransoms paid is not known. The results of an April 2021 survey of 1000 Australian adults on ‘understanding ransomware’, conducted by the Cyber Security Cooperative Research Centre, demonstrated that the community requires more understanding and education around ransomware.17 The Ransomware Payments Bill 2021 introduced into Federal Parliament in June 202118 proposes mandatory notification of ransomware payments by most organisations. If it becomes law, it will mandate some organisations to notify the ACSC about a ransomware incident and payment. This is an important first step to gaining visibility of ransomware and providing threat intelligence that may protect other Australian organisations. The US government has advanced work in this space. After the Colonial Pipeline attack in May 2021, which caused panic buying and led to fuel shortages in some parts of the US,19 it gave ransomware attacks priority similar to that afforded terrorism. The CyberSecurity and Infrastructure Security Agency (CISA) established a Stop Ransomware website20 in mid-July 2021 to serve as a clearinghouse for resources to help organisations protect their networks.21 Cryptocurrency payment schemes that enable anonymous transactions greatly facilitate the success of ransomware attacks. The ransom paid for the US Colonial Pipeline attack was partly recovered by the FBI,22 a positive step that demonstrated one way of dismantling a link in the ransomware chain. The cyber insurance industry is also taking steps to respond to ransomware. With ransomware now accounting for 75 percent of claims,23 leading global cyber insurance companies have joined forces to enhance cyber risk mitigation efforts, provide value to policyholders, and ensure a competitive cyber insurance market.24 The answer to the question “How will we win against ransomware?” will not be easy to find. It will require a collaborative effort between government, information security agencies and organisations, the private, public and not-for-profit sectors of the economy, and cyber insurers. www.linkedin.com/in/marise-alphonso/
WOMEN IN SECURITY MAGAZINE
97
SPONSORSHIP OPPORTUNITIES
Make a difference and help us create and maintain a supportive and inspiring security community for women Please reach out to sponsorship@awsn.org.au to discuss in more detail
A very big thank you to our sponsors so far:
STUDENT IN SECURITY SPOTLIGHT
Kathy Nguyen is a Master of Information Technology student majoring in Cybersecurity and Networks from the Queensland University of Technology. She grew up in Vietnam and came to Australia when she was sixteen. KATHY NGUYEN
Intern (GRC) and Women in Cyber Scholar, CyberCX
WHY DID YOU CHOOSE TO STUDY SECURITY?
Whether or not your job has a customer-facing
I chose to study security because of my passion
many different situations. If you are a penetration
for privacy and data protection, which are closely connected to cybersecurity. Before I started my Masters, I worked in privacy law and got to see first-hand the detrimental effects of cyberattacks on individuals and organisations. This inspired me to undertake further education to gain fundamental technical skills in cybersecurity and pursue a career in this constantly evolving industry. Because I am motivated most by the gratification of solving problems and learning, cybersecurity is the ideal field where I can learn new things every day and make a positive impact on people’s online safety.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
tester, you need to have written communication skills so you can write a report that makes sense to the customer: one without too much technical jargon. If you work in cyber awareness and training, you need excellent oral presentation skills to deliver engaging workshops to audiences who have different backgrounds. No matter what your job is, it is more than likely you will work in a team and need to communicate with others. At the very least, as an aspiring cyber professional, good communication skills enable you to build rapport with interviewers and demonstrate your capabilities effectively. Finally: creativity. Creativity might be the last word you think of in relation to cybersecurity. However, cybersecurity is not about black versus white. As technology evolves and threat actors become more
While technical skills are in high demand and will
innovative and creative in their attacks, many areas
perhaps always be important in certain areas, I think a
of cybersecurity will require creativity and innovative
person wishing to succeed in this industry also needs
solutions.
to have excellent soft skills such as critical thinking,
I would encourage them to start networking as
communication, and creativity.
soon as possible. While they may dread the saying
At its core, critical thinking means to question the
“it’s who you know, not what you know” with its
information you receive, considering it from different
negative connotations, it often rings true. The right
perspectives, and challenging biases or assumptions
connections can make all the difference. Networking
before drawing conclusions and making decisions.
can help students make meaningful professional
The importance of applying critical thinking to
relationships, explore the routes to cyber roles, and
cybersecurity cannot be overstated. Cybersecurity is
discover the skill set required to succeed as a cyber
a constantly evolving field. With each new wave of
professional. Networking helped me to understand
technology, new challenges and risks are created.
that cybersecurity is not only about penetration
The ability to think critically is key to mitigating cyber risks because it enables cybersecurity professionals to: • consider cyber threats more holistically, • break down a complex event into its essential elements to identify the root cause, and • consider all relevant stakeholders’ views and objectives.
100
aspect, good communication skills are essential in
WOMEN IN SECURITY MAGAZINE
testing or hacking, and certainly not like in Hollywood movies. It has also allowed me to connect with others in the industry and discover professional opportunities.
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING? I want to work in governance, risk and compliance. I am passionate about helping organisations achieve
their security and compliance objectives in a way that also aligns with their business goals. I believe my legal background and passion for privacy will be helpful in this area.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? I value diversity and culture when choosing a place of work. It is perhaps odd to feel a sense of belonging in a group of individuals who are so fundamentally different from each other, whether in their gender, age, ethnicity, professional background, or life experience, but that is exactly how diversity makes me feel. Coming from a non-English-speaking country and being a woman who seeks to enter a maledominated industry, I am attracted to workplaces that clearly demonstrate commitments to improving diversity and inclusion. This is not only because I know I will feel welcomed, but also because I know there will be lots I can learn from my co-workers. Diversity is closely tied to culture. Culture is important to me because I believe that a supportive, positive and collaborative culture can foster great relationships, retain talent, and help employees and organisations thrive.
DO YOU LISTEN TO ANY SECURITY PODCASTS OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? I like listening to OzCyber Unlocked by AustCyber, which is a series of podcasts that explain cybersecurity in simple terms. I think this podcast is a great starting point for anyone who does not have a background in cybersecurity but wants to learn more about this exciting industry. I also enjoy the Women in Security Podcast by Lifen Tan, which is devoted to telling the stories of great women in the world of information and cybersecurity. www.linkedin.com/in/kathy-tht-nguyen/
WOMEN IN SECURITY MAGAZINE
101
POOJA SHANKAR
Pooja Shankar is a final year Bachelor of Information Technology student at Monash University, majoring in networks and security and minoring in IT for business. She spent most of her childhood in Melbourne, before that she lived in Kuwait. Final year Bachelor of IT student, Monash University | Intern, CyberCX
WHY DID YOU CHOOSE TO STUDY SECURITY?
People face conflict and hardship every day. Thus
I was made aware of the prevalence of technology
providing real-world solutions for some of the biggest
and its impact on our lives at a young age. I have realised that almost nothing today is possible without technology, whether it’s how we order our food or how we move from A to B. Thus I understand it’s crucial to tackle the need for privacy and the security of digital
I hope to work for an organisation that invests in challenges our world faces today, in their careers and personal lives. Knowing I was part of something important—an organisation that makes an impact on society, whether it’s fighting climate change or reducing unemployment, — would provide me with a
information.
sense of pride and satisfaction.
Increasing dependence on technology has made it
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY?
easier for us to become a target for malicious actors. I started learning at an early age about various ways cyber-attacks occur and my interest in cybersecurity increased. I wanted to make a difference and chose cybersecurity as my career. I find it exciting because cyber-attacks are only going to increase.
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING? I see myself being drawn to security integration or operations team because these represent the “immune system” or backbone of security of any organisation; constantly monitoring, protecting the business, preventing attacks and incursions into the
Before expanding my knowledge about the industry, I had a false perception that security and cyber-attacks, required focus only when an incident occurred. Also, I realised that privacy and digital safety are not issues for the workplace alone. They are an essential part of everyone’s life. I believe there is no such thing as perimeter security because every device can connect to the internet, so we need to focus on security endto-end: from the home to the workplace. I wish I was more knowledgeable about various aspects of security, and the opportunities they present for career progression. Upon discovering how
IT systems.
diverse cybersecurity is in an organisation, I realised
For such a team every day would be different. So, I
based on specific interests.
believe working in such a team would be exciting and a great place for me to acquire strong fundamental
it presents many opportunities to carve out a career
I also hope to learn security architecture and strategy
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
and help my employer develop cyber resilience.
Personally, I think it is perseverance and
security skills.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK?
determination. The industry is growing rapidly, which makes it a very challenging career pathway. Constant learning and knowledge building are crucial since experts have to work with different technologies and
I strongly believe in being part of an organisation that
tools. Furthermore, a committed attitude and good
not only provides excellent cybersecurity services
communication skills are essential non-technical
but also makes an impact on a larger scale. As a
skills a person needs to cope with the challenges of
graduate, I would be drawn towards an organisation
working in cybersecurity.
that values employee satisfaction, encourages strong work culture and promotes inclusivity and diversity.
102
WOMEN IN SECURITY MAGAZINE
www.linkedin.com/in/pooja-shankar-633a96181/
Victoria Cheng is studying for a Bachelor of Business (Finance) and Science in Information Technology (Networking and Cybersecurity) from the University of Technology Sydney. VICTORIA CHENG
Penultimate Business and IT student, Secretary at UTS Cyber Security Society
WHY DID YOU CHOOSE TO STUDY SECURITY? At the beginning of year 12, I attended a five-day program run by a university society. Before the workshop, I wanted to study something related to technology at university but was unsure exactly what. I was introduced to cybersecurity in that program, heard from a penetration tester, and decided it was what I wanted to do. Now I know more about the industry, I understand penetration testing is only a small component of cybersecurity, and there are many other fields within cyber, besides penetration testing. Even though I knew I wanted to study cybersecurity at university, I didn’t know a lot about the industry back then. I knew it was a rapidly expanding field and that I would be faced with different challenges every day.
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? While I am not a security expert here are some things I wish I knew earlier as a student. To all current and future security students, my advice is: take advantage of the number of resources available online. Platforms such as Try Hack Me and PentesterLab provide theoretical and practical components ranging from beginner to advanced. You’ll be surprised how much you can apply what you learn from these platforms to Capture the Flag (CTF) challenges. Another piece of advice: enter CTF competitions. I’ve learnt a new skill or a new tool in every CTF competition I’ve entered. Even though there were times when I couldn’t solve the challenge, I learned something new every time from my attempts. And if you solve a challenge, that’s something to be proud of. As you solve these challenges, write notes on how you solved the challenge so you can look back on them. For challenges you were unable to solve, reading the official write-ups released by the organisers is another way to learn.
Lastly, join infosec communities, whether the security societies at university or larger ones like the Australian Women in Security Network (AWSN). You will get to chat with like-minded people and pick the brains of experienced people who are happy to share knowledge.
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING? I’m open to working anywhere right now because I think that you can learn different things from different companies. Whether you are working in a company’s infosec department or for a security-based company, you will be exposed to dynamic environments and types of work.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? Team culture and the type of work. Team culture is important because I would be working with my team for hours and I’d want to be surrounded by people who could bring out the best in me, and vice versa. As the saying goes, ‘teamwork makes the dream work’. The type of work is also important because I’d want to work in a company that gave me exposure to different kinds of work.
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU? I am currently an executive in the Cyber Security Society at UTS (CSEC). I joined last August, and meeting with like-minded people and learning from executives already in the industry has been amazing. CSEC community is incredibly supportive and always willing to help beginners. I hope to facilitate that same inclusive environment and help organise educational workshops for our members. CSEC continues to have a significant impact on my journey. www.linkedin.com/in/victoria-cheng371
utscyber.org/
WOMEN IN SECURITY MAGAZINE
103
JACYNTA GRIGSON
Jacynta Grigson is studying Bachelor of Science (Cybersecurity) from Edith Cowan University. She grew up in Western Australia and has lived in the state her whole life. She moved around a bit as a kid and lived in small country towns until she was 10 and her family settled in the southern suburbs of Perth. Penultimate year Bachelor of Science (Cybersecurity) student, Edith Cowan University
WHY DID YOU CHOOSE TO STUDY SECURITY?
enough. Make a schedule and stick to it. It will help
When I first heard about the Stuxnet attack I became
your grades by ensuring you do not fall behind.
curious as to how it had been executed and how it could be prevented. I also became fascinated by the dark web and how organised crime functions anonymously on it. I chose cybersecurity because of these interests, but I also knew it would be a challenging, dynamic career where I could make a
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING? I see myself working in cyber threat intelligence. Ideally, I would love to work in government or the defence force to help protect my country from cyber
difference and help protect people from cyber-crime.
threats. However, I also feel the opportunities are
WHAT INSPIRES YOU?
to see where the future leads me.
I love a good challenge. Whether it be completing a crossword or setting goals and achieving them. I feel there is nothing more rewarding than fulfilling a difficult task. I suppose that’s why I hugely enjoy studying. I am also highly motivated by my future prospects. I look forward to having a rewarding career in which I can help people.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
endless with new ones arising every day, so I am keen
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? Community. When I choose a new workplace, I want somewhere I will feel welcome and encouraged. I believe a well-functioning team needs a strong sense of community, and that encouragement is a huge motivator.
I believe the most important skill needed to succeed
ARE YOU PART OF ANY GROUPS OR ASSOCIATIONS, OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU?
in cybersecurity is the passion to learn. Technology
I am a member of the Australian Information
is constantly changing, so a willingness to keep up is vital.
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS?
Security Association (AISA) and was provided with a membership of the Australian Computer Society (ACS) with my Cyber Security Cooperative Research Centre scholarship. I have also just become a member of the Australian Women in Security Network (AWSN) and have applied for its cadet program. I have
Immerse yourself in the industry by joining groups
found my membership of these associations an asset
and associations, and keep up to date with related
during my studies, providing numerous opportunities
news and topics. Get out there and network. Take
to network, attend seminars and receive industry-
advantage of the free courses or certifications that
specific news.
apply to your chosen field. They look great on your resume and will help enhance your skills. Finally, time management is your friend. I cannot stress this
104
give you study/life balance, reduce stress and improve
WOMEN IN SECURITY MAGAZINE
I am also a member of the Edith Cowan University Computing and Security Students group on LinkedIn,
which has also provided me with opportunities to network, along with links to scholarship and internship opportunities.
WHO WOULD YOU LIKE TO BE MENTORED BY? I would love to be mentored by someone who has cybersecurity interests similar to my own, such as cyber intelligence, the dark web and cyber-physical attacks.
DO YOU LISTEN TO ANY SECURITY PODCASTS, OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? Craig Ford’s “A hacker I am” is a great read. I found it gave me industry insights, and he wrote in a way that wasn’t too technical for someone starting their cyber journey. I am yet to read volume two, but I am very eager to do so. My recommendation for students is Computer Security Principles and Practice by William Stallings and Lawrie Brown. It was required for one of my firstyear units and has now become my go-to text for any unit because it covers a broad range of topics. While I don’t listen to any podcasts, I have benefitted from keeping up to date with security news from Krebbs and ACS’s Information Age.
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY? When I was sixteen I left high school and applied to study at TAFE. I put art as my first choice on my application and IT as my second. If I had known then that cybersecurity would become such a booming industry, and that I would enjoy it enormously, I would have picked it as my first choice. www.linkedin.com/in/jacynta-grigson-a350681aa
WOMEN IN SECURITY MAGAZINE
105
DO YOU WANT YOUR VOICE TO BE HEARD?
Contact us today to find out how you can become an industry contributor, no matter the level of experience.
REACH OUT NOW
Aarati Pradhananga is studying for a Master of Information Technology and Systems from the University of Canberra, and specialising in cybersecurity. She moved to Canberra from Nepal and is grateful to have experienced the best of both worlds. AARATI PRADHANANGA
Final year Master of IT & Systems student, University of Canberra
WHY DID YOU CHOOSE TO STUDY SECURITY? affects everyone throughout their daily lives. I chose
ARE YOU PART OF ANY GROUPS OR ASSOCIATIONS, OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU?
to study it because I wanted to learn technical
I am a member of the Australian Women in Security
knowledge so I could mitigate the impacts of threats,
Network and Australian Defence Force Cyber Gap
and educate people the importance of being cyber
program. I’ve been fortunate that my mentors from
safe. A security qualification opens the door to
these associations have helped me guide on my
exciting jobs in an ever-growing industry from which I
journey, learn from them and widen my network.
can gain core knowledge.
Having someone in the field who is willing to
With everything digitized in today’s world, security
provide their learnings is really valuable. I strongly
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? “The man who moves a mountain begins by carrying away small stones.”- Confucius It’s easier to look at others and feel incompetent. Always remember your competition is your past, not the people around you. Work on yourself daily by making small habit changes and celebrating them. Most importantly, reward yourself and celebrate the small victories.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? I care about having a team that wants to build and grow together.
recommend anyone new to find a mentor from any of the numerous organisations that offer this.
DO YOU LISTEN TO ANY SECURITY PODCASTS, OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? I’d highly recommend: Darknet Diaries, Malicious Life by Cybereason, OzCyber Unlocked, Smashing Security and Hackable.
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY? I wish I knew how easy it was to get started. If you are looking at entering this field, search online and you will find plenty of resources to get you started. My recommended websites are tryhackme.com and ine.com. Also, create a LinkedIn account and connect with people within the industry and with influencers/
Having worked in a few roles in various industries,
experts. This will keep you updated with the latest
including cyber, I have realised that people are the
cybersecurity news, allow you to expand your
most important factor when choosing a workplace.
network, and provide you with career opportunities.
You spend more time with your colleagues than you do with your loved ones. It’s important to be surrounded by people who motivate, empower, push you, and, ultimately, celebrate with you. Throughout my career, I have surrounded myself with great colleagues who have provided me with guidance to help me learn, and the opportunity to grow from their mistakes and experiences.
Soft skills matter in this field. You need to be able to translate technical matters for other individuals who may not have the relevant background. The ability to adapt and change your terminology depending on your audience is a crucial skill. Having communication skills allows you to express yourself clearly and efficiently. www.linkedin.com/in/aarati-pradhananga/
instagram.com/cyberwithaarati
WOMEN IN SECURITY MAGAZINE
107
Kavika Singhal is studying for a Bachelor of Cyber Security and Behaviour from Western Sydney University. She has a diverse background and has lived and studied in several countries: India, United States, UK, and now Australia. KAVIKA SINGHAL
Final Year Cybersecurity Student, Western Sydney University
WHY DID YOU CHOOSE TO STUDY SECURITY? My passion for cybersecurity stems from my interest in mystery novels and crime shows I’ve had since I was eight. I enjoyed the process of unravelling the unidentified.
People and ethics are also important. Each workplace operates to gain profits. It needs money to sustain itself. Ethics in business dealings and client relationships make for a good working environment and strengthen interpersonal relationships.
As I commenced my university course, I became more passionate about cybersecurity. I realised my passion had ignited the desire to challenge myself, to become a warrior in the virtual world while making a difference in the real world.
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS, OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU?
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD? Success in cybersecurity is defined by one’s goals. I don’t think there is a common measure of success in any field, because everyone’s journey is different. Some might aim to work as cyber intelligence analysts, others might aim to become CISOs. Consistency and resilience complement hard work. People need to crave knowledge each day they show up at work: the industry demands it. Someone once told me, “Cyber people never sleep.” Does this not mean cybersecurity is packed with zombies? No, it’s an expression of how passionate cybersecurity professionals are. So, for me, the key to success is “always be curious.”
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? If they have a strong will to know more and strive to be better each day, they will never lose.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? I realised in my first internship the wide gap between education and industry. There’s pros and cons for both environments, but from my perspective, the university offers unlimited freedom to innovate, explore, and fail. I would love to work in an environment where my vision and goals match my
108
employer’s, and where I have the freedom to innovate.
WOMEN IN SECURITY MAGAZINE
Yes, I am a member of the Australian Women in Security Network (AWSN)—an organisation led by and consisting of the most awe-inspiring women in the industry—of the Australian Computing Society (ACS) and the Australian Information Security Association (AISA). I am President of the WSU Cyber Security Association (a cybersecurity club in my university). These industry associations are my greatest motivator. The experiences and the deep insights of members challenge me to aim higher and strive to achieve. I apply these learnings in my student association to empower my peers to take the initiative and lead. The cybersecurity community is extremely helpful, and I am grateful to all its members.
WHO WOULD YOU LIKE TO BE MENTORED BY? The list is too long and would be unfair to name just a handful. The cybersecurity community has is very diverse. It would be interesting to see the industry from some different perspectives. For example, I would like to view the cyber world through the lens of a bioinformatics scientist, a mathematician, a social media influencer, etc.
DO YOU LISTEN TO ANY SECURITY PODCASTS, OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? I listen to Darknet Diaries, Hacking into Security, and KBKast quite often. www.linkedin.com/in/kavika-s-b60969192/
Karen Hobson is studying for an Advanced Diploma of Cyber Security at South Metropolitan TAFE, Murdoch Campus, WA. She grew up in East Gippsland, Victoria. KAREN HOBSON
Advanced Diploma of Cyber Security Student, South Metropolitan TAFE, Murdoch WA
WHY DID YOU CHOOSE TO STUDY SECURITY?
are the areas that I have been drawn to while studying
I am studying to expand my skills and achieve
to people and companies to become more cyber safe
a career transition where I can transfer some of my existing IT skills into the growth industry of cybersecurity. Cybersecurity is highly diverse. There are many areas to learn about, the cyber landscape is always changing, and I love a challenge.
WHAT INSPIRES YOU? We are bombarded with cyber-attacks, phishing emails and smishing texts every day. People become victims of cybercrimes every day. It’s not just big businesses being attacked, but small businesses and individuals. We cannot, and should not, have to pay for these attacks on our personal computers, our accounts, and even our individual identities. I want to help my community and my country harden their defences, be more cyber aware, and stop becoming victims of cyber-crime.
and I believe these areas can make a real difference in our digital world. The more secure we can make our networks, the safer our online interactions will be.
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU? I have memberships with the Australian Information Security Association (AISA), the Australian Women in Security Network (AWSN) and Women in Technology, Western Australia (WiTWA). All of these organisations provide great insightful and educational information to their members through their websites, events and newsletters. The cybersecurity community here in Perth is awesome. Everyone I have met is very welcoming, always willing to answer questions or help out where they can. I volunteer as a tutor for the Girls Programming
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
Network (GPN). I enjoy their events. It’s great to
IT skills are definitely needed, along with hands-
as a great opportunity for the students and myself
on networking skills, problem-solving, creativity, teamwork, communication and organisation skills.
spend time with like-minded volunteers and mentors, to help kids achieve their coding goals. I see this because it is a proactive way to inspire girls into ITrelated fields and to keep up my python programming
It also helps to be curious and want to know how
skills.
things work and why they work the way they do.
I have completed two internships at the Department
Cybersecurity or any IT specialists should enjoy learning because all areas of IT require continuous learning, especially cybersecurity where the landscape can change daily.
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING?
of Premier and Cabinet’s Cyber Security Unit whilst studying for my Advanced Diploma. I have had the opportunity to gain knowledge and work with most of the people in the cyber unit who have all been wonderful mentors to me. Internships are immensely helpful to students to gain real-world experience and to put what is learnt in the classroom to use in a work
There are so many interesting areas within
environment. They are also a great way to see exactly
cybersecurity to chose from. I could see myself
what the job/s you are training for are actually like.
working in Security Testing and Assurance doing Vulnerability Assessments and Testing, Application
www.linkedin.com/in/karen-hobson-81949136/
Security or Governance, Risk and Compliance. These
WOMEN IN SECURITY MAGAZINE
109
Shahnaz Ali grew up in India and is studying Certificate IV in Cyber Security from Box Hill Institute, Melbourne, Australia. SHAHNAZ ALI
Cert IV Cyber Security Student, Box Hill Institute
WHY DID YOU CHOOSE TO STUDY SECURITY?
WHERE DO YOU WANT TO WORK OR SEE YOURSELF WORKING?
I have an accounting background and switching from
I would love to work under a mentor who could direct
accounting to IT was a big decision for me. I chose
me to chase my dream.
cybersecurity because I wanted to learn something different and challenging. I wanted to expand my knowledge horizon, learn programming, networking and working with VMs. All these topics excite me. I really want to contribute something to mankind: to help and protect the world from cybercrime. Though I have my own challenges, because I knew nothing about IT when I started in cybersecurity. The more I learn and the more familiar I become with the cyber world, the more interesting I find it.
WHAT INSPIRES YOU? The constantly changing, dynamic nature of IT. There are new surprises every day. Juggling multiple tasks keeps me motivated.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD? One should have a positive outlook, be hardworking, sincere, honest, open to change, and open to learning new things. One should be well versed in networking and programming.
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? Learn, learn and learn. Just get started, be it in networking, programming, or anything else.
110
WOMEN IN SECURITY MAGAZINE
After becoming sufficiently learned and sufficiently experienced, I would love to have my own venture so I can help people and society at large.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? If given the opportunity I would definitely choose a workplace that could motivate me in ways I did not know exist, a workplace that could help me to explore my own strengths, and gives me room to fly: a workplace where the people help each other, are open-minded, grounded and honest. www.linkedin.com/in/shahnaz-ali-b3a699200/
Jocasta is studying Master of Business (Business Information Systems) from RMIT University, a master’s by research. Her research questions are in cybersecurity supply chain risk management. She grew up in New Zealand, travelled 43 countries and now lives in Australia. JOCASTA NORMAN
Masters by Research Student (Cyber Security Supply Chain Risk), RMIT University
WHY DID YOU CHOOSE TO STUDY SECURITY? I was feeling unhappy and unfulfilled in the work I was
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS?
doing and decided it was time for a change. I love
I think it’s really important to network, volunteer for
learning and knew I wanted to go back to University
organisations and networking groups, and to talk to
and study. I looked at my skill set and personality, and
people. There are usually student memberships or
at what was in demand, and landed on cybersecurity.
student rates for conferences and events. Anyone
I love problem-solving, learning, the dynamic nature
aspiring to a career in cybersecurity should take
of the industry, and the idea of contributing to a field
advantage of these to meet people. It’s also great
that protects people from harm. There is always
to talk to others about their careers and how they
something to learn and there are so many facets to it
progressed, especially to inform your decisions
I can’t see myself ever getting bored.
around the qualifications you might want to acquire.
I started a coursework Master of Cyber Security at
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK?
La Trobe University in 2019. However, I soon realised I would rather focus on one area and research that in-depth. So I exited that course with a Graduate Certificate and last year moved to undertake a Masters by research. Combining my undergraduate degree in logistics I decided on supply chain cybersecurity.
WHAT INSPIRES YOU? I get really inspired by giving back and contributing to keeping people and organisations safer. I’m also incredibly inspired when people find creative solutions to complex and challenging problems.
As a mum, and someone who has worked for myself for over a decade, one of my most important considerations is flexibility, work from home options, and a general acceptance of the cadence of life with young kids. I don’t like being micromanaged, I prefer to be trusted to get the work done and that I will ask if I’m not sure about something. I also care about the mission and vision of the organisation. I want to align with organisations that are people-focussed and have products or services that are for the greater good.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU?
I think a person needs to be willing to learn, be
I have been part of the Australian Women in Security
flexible, and be able to pivot and deal with the dynamic nature of the cyber field. Things are always changing. I think communication skills are key, along with a love of learning, critical thinking and problem-solving. They also need the ability to work both independently and as part of a team, because collaboration is key.
Network (AWSN) for a couple of years. I joined as a cadet and recently started volunteering to help with events management. I am also a student member of ISACA and of the Australian Information Security Association (AISA).
WHO WOULD YOU LIKE TO BE MENTORED BY? This is a hard one, there are so many fabulous people. I’m really happy to be part of the AWSN Mentoring
WOMEN IN SECURITY MAGAZINE
111
Program and have been able to speak to some great people through that. I’m currently working part-time at Healthscope under the amazing leadership of CISO Mitra Minai, I’m very grateful for the opportunity to see how she leads. My hat goes off to AWSN founder Jacqui Loustau for all her guidance and support, and for everything she does for everyone who benefits from the AWSN.
DO YOU LISTEN TO ANY SECURITY PODCASTS, OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? Definitely, I love podcasts and have found them to be very useful. I discovered the AWSN through a podcast when I heard Jacqui Loustau being interviewed on Cyber Security Weekly. These are some of my other favourites: The Security Collective, ISACA Podcast, The Get Cyber Resilient Show, Cyber Security Interviews, The Social-Engineer Podcast, Great Women in Compliance, Darknet Diaries, The New CISO with Steve Moore and AusCERT’s Share Today Save Tomorrow.
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY? I wish I knew exactly what I wanted to do, or that I could clone myself so I could do more things simultaneously. There are so many amazing opportunities and so many different areas that look enticing. I’m currently working in cybersecurity education and influence, which is great. It plays well to my strengths in marketing and communication. I also really enjoy my research on the supply chain risk side, and if I had time I would like to try more technical aspects, do some Capture the Flag events and learn more about ethical hacking. In high school, I wanted to be a forensic scientist, so I keep thinking I’d love to learn more about computer forensics too. It certainly now holds more appeal than dealing with dead bodies and crime scenes! www.linkedin.com/in/jocasta-norman
112
WOMEN IN SECURITY MAGAZINE
Maeesha is a Security Consultant at Cyber Risk and is studying computer science (majoring in cybersecurity) at Swinburne University of Technology. Her extensive travelling has allowed her to embrace different cultures, consequently shaping her personality and empathizing ability. MAEESHA LOHANI
Security Consultant, Cyber Risk and Final Year Bachelor of Computer Science, Swinburne University of Technology
WHY DID YOU CHOOSE TO STUDY SECURITY?
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING?
Cybersecurity is a rapidly growing industry that
I aspire to be a penetration tester and an exploit
provides passionate individuals with unique
developer who can uncover complex vulnerabilities
opportunities. Because the industry is so young, there
and exploit chains within established software.
is ample scope for growth and research, allowing
myself, in a way that helps future generations as well
DO YOU LISTEN TO ANY SECURITY PODCASTS, OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND?
as my own.
If you are interested in web application penetration
each of us to make a mark and shape the future. I would like to contribute to something bigger than
WHAT INSPIRES YOU?
testing I recommend reading the Tangled Web and the Web Application Hacker’s Handbook (WAHH).
My aspirations stem from multiple individuals who
The Tangled Web provides a good foundation for
I’ve seen in action and analysed closely. These
understanding web technology, and WAHH provides
individuals include my mother, Jacqui Loustau, Jill
an in-depth account of multiple attack vectors.
Taylor and my brother Sajeeb. My mother showed me a business and bringing up kids without neglecting
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY?
either. As strong women in this industry, both Jacqui
I wish I knew how willing and open the community is
and Jill have shown me there are no bounds to what
to help a newcomer. I started off being quite nervous
you can achieve, provided you are able to put in the
when I did not need to be.
it is possible to be an organised individual, managing
effort required.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD? I believe it is important to have good communication and socialisation skills because communication is required when dealing with clients and fellow employees. Networking is a major part of growth. It creates the opportunities you need to expand your skillset.
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? Listen and learn from the stories told by people in the industry. It’s a great way to make friends, but also an easy way to avoid mistakes.
www.linkedin.com/in/maeesha-lohani-643733170
twitter.com/0ddInput
Abby Zhang grew up in China and recently graduated from the Unitec Institute of Technology in Auckland with a Graduate diploma in computing (Network and Cybersecurity). ABBY ZHANG
SheLeadsTech Liaison and Ambassador, ISACA Auckland Chapter
WHY DID YOU CHOOSE TO STUDY SECURITY? Personal interest and hobby. I am a marathon
HOW WELL DID YOUR EDUCATION AND UNIVERSITY EXPERIENCE HELP YOU PREPARE FOR A JOB?
runner and I love that it challenges me and makes
Unitec changed my life and my future. It opened my
me happier. In some ways, cybersecurity has been
eyes, gave me security skills and knowledge: great
the same for me which is why I chose to study
advantages for a job. If I had not studied in Unitec, I
cybersecurity.
would not be as confident and comfortable to work in the industry.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD? There are abundant resources people can find online
WHAT ARE SOME THINGS YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK?
to gain technical knowledge and skills, important to
The team environment, the company culture, the
succeed in the cyber field. From my experience, the
career development opportunities and the career path
following personal attributes are the most important
are my main concerns when choosing a job.
factors to achieve success: • Be yourself and learn what you really, not what other people expect. • “Stay hungry, stay foolish”. • Never give up. • Try harder and make it happen. • Be kind, thankful, confident, positive, and strong. • Be open to any opportunity. • Focus on every small step, not just the big picture.
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? Network with diverse professionals in the cyber industry and attend different security events to identify your own security domain and direction. The meetup app has a lot of good workshops or events.
WHAT DOES YOUR TYPICAL DAY LOOK LIKE?
WERE YOU PART OF ANY GROUPS, ASSOCIATIONS OR HAD YOU BEEN MENTORED? HOW DID THAT HELP YOU? I am a volunteer on the ISACA China community and Auckland Chapter. This has helped me to meet professional people and gain amazing technical knowledge and skills. For example, I was not sufficiently confident to follow my dream: a lot of people told me I should give up. ISACA SheLeadsTech event speaker Jo Stewart-Rattray shared her career story and that event inspired me greatly. I am running similar ISACA SheLeadsTech events in the ISACA Auckland Chapter.
DO YOU LISTEN TO ANY SECURITY PODCASTS OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? The Official Offensive Security Podcast (offensivesecurity.com) is a good podcast.
I usually spend most time studying for OSCP and also learn new security skills or knowledge in my spare time. I believe continuous learning is very important for career progression and growth. Every day can get tiring, but I am also happy to see myself growing.
114
WOMEN IN SECURITY MAGAZINE
www.linkedin.com/in/abby-%F0%9F%98%81-28bb5581/
Cyber Security Security Cyber
# TO TO PWOM PWOM ENI ENI NS NS ECURITYASE ECURITYASE AN AN # WO MENINSECURI MENINSECURI TYASEANRE TYASEANRE G G ION ION .. COM COM WO
T
AWARDS CEREMONY - 5:00pmCLOSE SGT | TUESDAY | 31 AUGUST 2021 NOMINATIONS 30 MAY 2021
his his initiative initiative has has been been established established to to recognize recognize women women who have have advanced advanced the the security security industry industry within within the the ten ten who countries of of the the Association Association of of Southeast Southeast Asia Asia Nations Nations countries (ASEAN). (ASEAN). The Top Women Security ASEAN followMarch Nominations wereinscheduled to openawards on Monday similar initiatives in India, as well as Africa, Europe and 8, 2021, coordinating with International Women’s Day. Canada and form part of a global campaign by the Women Security Resilience Alliance (WISECRA). The Top in Women in &Security ASEAN awards follow This initiative is open to all ASEAN countries following similar initiatives in India, as well as Africa, Europe and very successful Top Women in Security Awards held Canada and form part of a global campaign by the during in Singapore, Malaysia and Philippines. Women2020 in Security & Resilience Alliance (WISECRA). This initiative is open to all ASEAN countries following very successful Top Women in Security Awards held during 2020 in Singapore, Malaysia and Philippines.
O RGA RGA N N II S S ERS ERS O
ME D D II A A PA PA RT RT NE NE R RS S ME
We We have have gathered gathered unique unique industry industry partnership partnership arrangements, bringing bringing together together key key chapters chapters of of premier, premier, arrangements, global security security industry industry associations associations and and professional professional global women in in security security groups groups in in Singapore. Singapore. Malaysia, Malaysia, women Indonesia, Philippines, Philippines, Thailand Thailand and and including including the the ASEAN ASEAN Indonesia, Region Women in Security Network. We thank them Region Women in Security Network. We thank them for for their their support. support. The awards will take a Nominations close 30place May, at 2021. virtual ceremony at 5:00pm The awards will take place in July SGT,2021. Tuesday, 31 August 2021. Please nominate at your earliest register opportunity. Please to attend the
REGISTER NOMINATE HERE HERE
awards.
SU PPO PPO RT RT II N NG G PA PA RT RT N NE ER RS S & & ASSO ASSO C C II AT AT II O ON NS S SU
ASEAN REGION ASEAN REGION
WOMEN IN SECURITY NETWORK WOMEN IN SECURITY NETWORK
Emma Seaman grew up in Sydney and is studying for a Master of Cyber Security Analysis and Master of Intelligence from Macquarie University. EMMA SEAMAN
Master of Cyber Security Analysis and Master of Intelligence student (part-time), Macquarie University
WHY DID YOU CHOOSE TO STUDY SECURITY?
program and the LEAD program and completed the
I always knew I didn’t want to study for a traditional
WSU. All these programs provided me with ongoing
IT degree. I got drawn to the security field when I
citizen scholar award as part of The Academy at opportunities and encouraged me to continue to
found the Bachelor of Cyber Security and Behaviour
challenge myself.
from Western Sydney University (WSU). It was unlike
During my final year as an undergraduate, I became
any typical course and I liked how it incorporated IT,
an NSW Cyber Security Ambassador, which has
security, criminology, and psychology. That’s where it
allowed me to participate in a number of industry
all started.
events over the past two years. Recently, I was a
WHAT INSPIRES YOU? People who are willing to take a risk, or be brave.
member of the panel at the launch of the NSW Cyber Security Strategy. This is something I would not have imagined myself doing before participating in any of these programs.
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
WHO WOULD YOU LIKE TO BE MENTORED BY?
Adaptability. Being able to adapt to change will give
I would love to be mentored by someone who has
them the ability to adjust and grow with the changes
been successful within the industry, or someone who
in the cyber industry. It requires you to continuously
may not have followed the standard job progression.
develop your skills and knowledge to keep relevant.
It would be great to see how someone had decided
You must continue to learn if you want to be
to take a risk in their career, or even developed a
successful in this industry.
business. I am still unsure where my career is headed,
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS?
would be a great learning opportunity.
I would suggest future or current students look into
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY?
the opportunities available in the industry, both at
I wish I knew about the variety of roles in the industry.
their university and externally, from as early in their
When I was studying for my undergraduate degree
studies as possible. They should not say no to an
the true scope of work was not widely discussed
opportunity just because they feel it is going to be too
amongst the students, the majority of whom had a
challenging. Every challenge is part of the journey.
similar career goal in mind. This is something I would
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS, OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU? When I was studying for my undergraduate degree, I participated in the Women in STEM Education (WiSE)
116
and being able to discuss the endless possibilities
WOMEN IN SECURITY MAGAZINE
suggest current and future students should explore. They should not be afraid to push the boundaries and look for opportunities that are not obvious. www.linkedin.com/in/emmaseaman/
Tiana Inman is in her penultimate year studying cybersecurity and business information systems at Murdoch University. She took a combined degree course as it encourages her to view cybersecurity from both a business and technical perspective. TIANA INMAN
Tiana Inman, Intern and Cyber Security Student
WHY DID YOU CHOOSE TO STUDY SECURITY?
Being a female cybersecurity student has inspired me
I have always possessed a passion for knowledge.
to continue to promote careers in security for other
I am easily excited about learning new things, and
women, and to try and bridge the gender gap that
there is nothing more exciting than technology. In
exists in STEM. I also work as an IT support officer
two decades it has transformed and enhanced our
at a school in Perth where I volunteered to run a girl
day-to-day lives. I marvel at technology’s trajectory to
coding club for high school students in Years 4-10.
the future. I always knew the IT industry was the path
It has been inspiring to see passion and curiosity
for me.
ignite in young girls through this club, and I intend
I was introduced to cybersecurity at high school when I heard about the devastating effects of worldwide
WHAT INSPIRES YOU?
to continue to promote cybersecurity as a career to women and students of all ages.
cyberattacks. I became curious about the implications
Similarly, to unite women studying STEM at university,
of a lack of cybersecurity. I wanted to learn more, and
I have recently founded the Women in STEM (WIS)
ultimately to make a difference in a world that has
Society at Murdoch University. It aims to celebrate
seen massive technology-enabled societal change,
and unite women in STEM and will focus on
especially for my generation. The opportunities and
networking and developing a sense of community
challenges associated with increased reliance on
among its members.
technology drew me to study security and commit to a career path dedicated to making technology safe for use by all members of society.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK?
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS OR HAVE YOU BEEN MENTORED? HOW HAS THAT HELPED YOU?
A company that celebrates inclusivity and diversity
One of my main values outside my studies is
to create an amazing culture and spark ideas and
inclusivity. Being a member of various networks — the
innovation.
is high on my list. Having a diverse team consisting of all genders, sexualities and backgrounds allow the company to leverage these differences in perspective
Australian Women in Security Network (AWSN); the introduced me to people who continuously remind
WHERE DO YOU WANT TO WORK OR SEE YOURSELF WORKING?
me of the importance and beauty of diversity in
While I am eager to explore multiple avenues in
Westpac100 Group; the Murdoch IT Society — has
the industry. I have been lucky to be one of two WA recipients of the CyberCX Women in Cyber Scholarship. Through this amazing opportunity, I have recently commenced a six-month internship where I am currently working with the Governance, Risk and Compliance team.
the cybersecurity industry, I’d love to work for a consultancy company such as CyberCX. They are sponsors of AWSN and various other security events and organisations, and they are renowned for having an amazing workplace culture and passion for customer satisfaction. www.linkedin.com/in/tiana-inman-6752521a6/
WOMEN IN SECURITY MAGAZINE
117
Caitlin Sauza is studying for a Bachelor of Cyber Security from Deakin University. She grew up in Melbourne’s Western Suburbs. CAITLIN SAUZA
Final Year Bachelor of Cyber Security Student, Deakin University
WHY DID YOU CHOOSE TO STUDY SECURITY?
don’t be afraid to express your interests. There may
Growing up, I was always interested in the IT space.
someone’s mind when something does come up, and
I had inspiring personal mentors to look up to, such as my uncle who has been working as a computer scientist for almost two decades. He was a huge influence on me. He introduced me to all things tech and pop culture. When I first started looking into studying for my bachelor’s, Deakin was the only institution offering it. I found this particularly
that is most important.
WHERE DO YOU WANT TO WORK, OR SEE YOURSELF WORKING? I had a taste of different parts of the industry in the years studying for my degree, but I am not currently drawn to any particular sector of cyber. If I had to pick
interesting, piquing my interest in the field further.
something, physical penetration testing seems really
WHAT INSPIRES YOU?
testers, and some of the stories they have told me
Having an impact on others and knowing I am doing good in this world. That has become my main goal in life. I love interacting with others, learning and experiencing new things every day. Studying cybersecurity is not my only interest. I’m an avid volunteer and currently work multiple jobs, which I
intriguing. I know a few people who are physical penwere extremely interesting.
WHAT DO YOU CARE ABOUT WHEN IT COMES TO CHOOSING A PLACE OF WORK? The people and the culture. If I do not mesh in a
love.
workplace, I know I will not be happy or succeed. I
WHAT SKILLS DO YOU THINK A PERSON NEEDS TO SUCCEED IN THE CYBER FIELD?
committed to a workplace because I loved what I was
It takes more than technical skills to succeed in the cyber field. Networking and interpersonal skills would be two of my top skills. The need for these is preached to students constantly, but the message sinks in only when they experience the impact networking can have on their future career path. Also, LinkedIn will be their friend, it’s an awesome way to maintain those connections.
WHAT ADVICE WOULD YOU GIVE TO CURRENT OR FUTURE SECURITY STUDENTS? Get yourself out there, and don’t wait until the final year to make connections. Attend events, connect to people on LinkedIn, maintain those connections. Also,
118
not be a spot open now, but you will be in the back of
WOMEN IN SECURITY MAGAZINE
have had situations in the past where I wanted to stay doing. But staying committed is hard when the people surrounding you are nothing but unpleasant. That is when you have to make the decision to stay with what you are doing, or leave for your mental health. I choose mental health above all else.
ARE YOU PART OF ANY GROUPS, ASSOCIATIONS, OR HAVE BEEN MENTORED? HOW HAS THAT HELPED YOU? I have been President of the Deakin Information Security Club (DISC) and a committee member of the Australian Women in Security Network (AWSN). I represented DISC at the 2019 Australian Cyber Security Conference. I chatted to almost every representative at every stall at the conference in order to develop rapport and to get the DISC name out to cybersecurity professionals. We were also on the
lookout for some awesome guest speakers, and I was definitely able to find some there. My role at DISC got my name out, despite the fact that I had not yet graduated. It also challenged me personally. I grew up introverted, and the switch I see in myself now from how I used to be is a complete 180. The role exposed me to experiences I may never have had if I had focused solely on studying and finishing my degree.
WHO WOULD YOU LIKE TO BE MENTORED BY? People who are making an impact on the masses, people who are putting in the hard yards behind the scenes to develop the industry, and who are regularly discovering and solving cybersecurity issues.
DO YOU LISTEN TO ANY SECURITY PODCASTS, OR READ ANY SECURITY BOOK THAT YOU WOULD RECOMMEND? Yes. One podcast I can highly recommend is Darknet Diaries by Jack Rhysider. He discusses stories of cybersecurity incidents in such a fascinating way. Give it a listen and you’ll be hooked.
WHAT DO YOU WISH YOU KNEW ABOUT THE SECURITY INDUSTRY? I wish I knew how big the industry was going to grow, it continues to develop day by day. www.linkedin.com/in/csauza
WOMEN IN SECURITY MAGAZINE
119
LISA ROTHFIELD-KIRSCHNER Author of How We Got Cyber Smart | Amazon Bestseller
Olivia & Jack get a Gamestation Olivia and Jack are twins and have been in lockdown for what seemed like forever. They missed seeing their friends and teachers at school. Remote learning wasn’t as much fun as learning with everyone at school. Olivia missed her favourite teacher at coding club and feeding the chickens at school, while Jack missed hanging out with his friends and his favourite teacher in gardening club. Olivia and Jack had been asking their parents for a gaming console throughout lockdown so they could play with their friends online. They were convinced they were the only kids in their school not to have one (it wasn’t true!) and desperately wanted one to play Basketball Boomers. To their surprise, one afternoon a delivery driver came to the door with a big parcel. Olivia and Jack were so excited and ripped open the box. Inside was the latest Gamestation console, “Woo hoo!”. Their Mom and Dad explained that “We have decided to buy you a special gift to cheer you up as we know lockdown and remote learning has been very hard for you. We know you have missed your friends and teachers and being able to run around in the school yard.” Olivia and Jack wanted to start playing on it straight away, but their Mom said, “First, let’s set up the Gamestation in the lounge room so we can see and hear what’s going on. Then we need to set up the parental controls on the Cyberlock
family app to keep you safe while you play on the Gamestation. Cyberlock will help to keep you safe from bad people online because it has settings that we can choose to make sure that you only play with people we allow and with games that are age-appropriate. Their Mom and Dad explained that “We have rules about using the Gamestation and will set specific times and days that you can use it. There will be set times for the weekends and school holidays. We think that you should have limits on how much you use it so you won’t be able to use it on school days so it doesn’t become a habit you can’t control”. We don’t want you playing so much that you stop playing outside and with other things . We will also set your age in the Cyberlock app so that only certain games can be played that are recommended for your age. When you try to download a new game, a notification will be sent to us to approve, so we will know exactly what games you try to download. If you disagree with the settings we can discuss it and we will do our own research and make a decision. We know you might not like our decision but we’re the adults and we want to keep you safe whilst you are gaming. Olivia and Jack already knew about cyberbullying and bad people online and that if anything strange ever happened they needed to tell a trusted adult so they could help. Soon, Olivia and Jack were having so much fun playing Basketball Boomers on the Gamestation, and were excited to share the news about their new console with all their friends.
120
WOMEN IN SECURITY MAGAZINE
Recom mend ed by F amily zone
How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary school-aged children.
READ NOW
WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 01
02
1. AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist
2. NARELLE DEVINE Chief Information Security Officer Asia Pacific, Telstra
03
04
3. HELEN SULTANA Manager, Cyber Security Education and Awareness
4. MEGAN HAAS Non Executive Director, Tesserent
5. CAROL CHRIS 05
06
Carol Chris, General Manager for Australia and New Zealand, GBG
6. CHRISTIE WILSON Cyber Resilience Manager, UniSuper
7. BRIANNE HADLEY Creative, connector and Knowledge vacuum
07
08
8. IAN YIP CEO of Avertro
9. NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum
09
10
10. JULIAN RANGER Executive President, and Founder at Digi.me
122
WOMEN IN SECURITY MAGAZINE
11
12
11. SASENKA ABEYSOORIYA Senior Strategic Adviser at The University of Queensland (UQ)
12. SAI K. HONIG CISSP, CCSP, Co-founder - New Zealand Network for Women in Security
13
14
13. LAURA JIEW AWSN National Social Media & Marketing Lead Events, Marketing and Communications coordinator for AusCERT
14. KIRSTIN MCINTOSH Head of Partnerships at Cyrise
15
16
15. SEAN MCINTYRE Security Analyst at AusCERT
16. CAROLYN CRANDALL CMO at Attivo Networks
17. SOPHIA PACE 17
18
Marketing Manager, Avertro
18. DEEPTHI BHUSHAN R&D Program Manager, FirstWave Cloud Technology
19. KAREN STEPHENS CEO and co-founder BCyber
19
20
20. CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2
WOMEN IN SECURITY MAGAZINE
123
WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 21
22
21. QUEEN A AIGBEFO Research student, Macquarie University
22. MARISE ALPHONSO Information Security Lead at Infoxchange
23. KATHY NGUYEN 23
24
Intern (GRC) and Women in Cyber Scholar, CyberCX
24. POOJA SHANKAR Final year Bachelor of IT student, Monash University | Intern, CyberCX
25. VICTORIA CHENG Penultimate Business and IT student, Secretary at UTS Cyber Security Society
25
26
26. JACYNTA GRIGSON Penultimate year Bachelor of Science (Cybersecurity) student, Edith Cowan University
27. AARATI PRADHANANGA Final year Master of IT & Systems student, University of Canberra
27
28
28. KAVIKA SINGHAL Final Year Cybersecurity Student, Western Sydney University
29. KAREN HOBSON Advanced Diploma of Cyber Security Student, South Metropolitan TAFE, Murdoch WA
29
30
30. SHAHNAZ ALI Cert IV Cyber Security Student, Box Hill Institute
124
WOMEN IN SECURITY MAGAZINE
31
32
31. JOCASTA NORMAN Masters by Research Student (Cyber Security Supply Chain Risk), RMIT University
32. MAEESHA LOHANI Security Consultant, Cyber Risk and Final Year Bachelor of Computer Science, Swinburne University of Technology
33
34
33. ABBY ZHANG SheLeadsTech Liaison and Ambassador, ISACA Auckland Chapter
34. EMMA SEAMAN Master of Cyber Security Analysis and Master of Intelligence student (part-time), Macquarie University
35
36
35. TIANA INMAN Tiana Inman, Intern and Cyber Security Student
36. CAITLIN SAUZA Final Year Bachelor of Cyber Security Student, Deakin University
37.LISA ROTHFIELD-KIRSCHNER 37 Author of How We Got Cyber Smart, Amazon Bestseller
WOMEN IN SECURITY MAGAZINE
125
TURN IT UP
ASIAL SECURITY INSIDER By Australian Security Industry Association Limited
CLICK TO LISTEN
By Dominique West
CLICK TO LISTEN
YOUR EVERYDAY CYBER PODCAST By Limor Kessem and Diana Kelly
CLICK TO LISTEN
Whether you are a cybersecurity enthusiast or just interested in how to keep your digital identity safe, join the Security in Color Podcast as your host, Dominique, takes you through the latest cyber and cloud security news.
Using internet-based services is part of our everyday lives. Nowadays, that’s also known as ‘cyber’. But do we know enough about living in it securely?
BREAKING INTO CYBERSECURITY
CANDID CYBERSEC PODCAST
SECURITYMETRICS PODCAST
By Renee Small and Christophe Foulon
By Vandana Sharma
By Jen Stone
The ASIAL Security Insider Podcast Series has been designed to help engage with the wider security community and industry to help gain key insights on specific topics with guest speakers and discussions.
CLICK TO LISTEN This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well.
126
SECURITY IN COLOR
WOMEN IN SECURITY MAGAZINE
CLICK TO LISTEN A podcast about what we work on, The podcast showcases guests’ unique ‘human factor’ while exploring the many facets of cybersecurity.
CLICK TO LISTEN The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
CYBER FOR WOMAN PODCAST By Palo Alto Networks
CLICK TO LISTEN The “Cyber for Women” podcast was created to talk about how women can build successful careers in cybersecurity, giving fresh perspectives on this ever-changing industry.
NEUROSEC PODCAST
LET’S TALK CYBER
By Nathan Chung
By Ankita Dhakar
CLICK TO LISTEN Uniting people and organizations to support and advance Neurodiverse people in Cybersecurity.
PATHS UNCOVERED PODCAST
AFTERNOON CYBER TEA
By Akanksha Malik
By Ann Johnson
CLICK TO LISTEN Paths Uncovered is a podcast run by @akankshamalik96 where we chat with people in the tech world and uncover their journeys to how they got to where they are.
CLICK TO LISTEN Ann Johnson, Corporate Vice President, Business Development, Security, Compliance & Identity at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers.
CLICK TO LISTEN Let’s talk Cyber is a platform where it aims to connect and talk with people passionate about IT security. Ankita believes education should be free! And by talking to industry experts we can educate and make more people aware about the things happening in cyberspace.
OPEN WEB APPLICATION SECURITY PROJECT (OWASP) By OWASP PORTLAND, OREGON CHAPTER
CLICK TO LISTEN OWASP) mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide.
TURN IT UP
NAB SECURITY PODCAST
CLOUD SECURITY PODCAST
THE SECURITY COLLECTIVE PODCAST
By Tara McCarthy
By Cloud Security Podcast Team
By Claire Pales
CLICK TO LISTEN
CLICK TO LISTEN
Want to stay up to date on the latest security insights? In this series, Tara McCarthy from NAB discusses the cyber security and fraud issues that may impact customers, and talks with subject matter experts about insights and practical tips on how users can keep their business safe.
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. They focus on being honest and aim to make the community learn
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all.
WEST COAST CYBER PODCAST
RANSOMWARE BATTLEGROUND PODCAST
TO THE POINTCYBERSECURITY
By Simon Carabetta, Caitriona Forde and Ben Aylett
CLICK TO LISTEN Hosted by WA AustCyber Innovation Hub project and engagement coordinator, Simon Carabetta, along with a special guest from within the cyber security industry each month, this podcast will discuss topics related specifically to the cyber security industry in WA.
128
CLICK TO LISTEN
WOMEN IN SECURITY MAGAZINE
By Syya Yasotornrat and Poul Frederiksen
CLICK TO LISTEN Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today.
Join best-selling author Claire Pales, together with industry thought leaders who answer your questions.
By Carolyn Ford and Eric Trexler
CLICK TO LISTEN Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government.
Committed to creating, promoting and growing cyber security careers for all women.
cybercx.com.au/careers
OFF THE SHELF
LURKING: HOW A PERSON BECAME A USER Author // Joanne McNeil A concise but wide-ranging personal history of the internet from―for the first time―the point of view of the user In a shockingly short amount of time, the internet has bound people around the world together and torn us apart and changed not just the way we communicate but who we are and who we can be. It has created a new, unprecedented cultural space that we are all a part of―even if we don’t participate, that is how we participate―but by which we’re continually surprised, betrayed, enriched, befuddled. We have churned through platforms and technologies and in turn been churned by them. And yet, the internet is us and always has been. In Lurking, Joanne McNeil digs deep and identifies the primary (if sometimes contradictory) concerns of people online: searching, safety, privacy, identity, community, anonymity, and visibility.
BUY THE BOOK HERE
LISTENING IN CYBERSECURITY IN AN INSECURE AGE Author // Susan Landau A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
BUY THE BOOK HERE
130
WOMEN IN SECURITY MAGAZINE
TRIBE OF HACKERS RED TEAM: TRIBAL KNOWLEDGE FROM THE BEST IN OFFENSIVE CYBERSECURITY Author // Marcus J. Carey and Jennifer Jin Want Red Team offensive advice from the biggest cybersecurity names in the industry? The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more.
BUY THE BOOK HERE
YOU’LL SEE THIS MESSAGE WHEN IT IS TOO LATE: THE LEGAL AND ECONOMIC AFTERMATH OF CYBERSECURITY BREACHES Author // Josephine Wolff What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach―the theft of 145.5 million Americans’ information from Equifax, for example, or the Russian government’s theft of National Security Agency documents, or the Sony Pictures data dump―makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn’t forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
BUY THE BOOK HERE
IMPLEMENTING CYBERSECURITY: A GUIDE TO THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RISK MANAGEMENT FRAMEWORK Author // Anne Kohnke, Ken E. Sigler, Dan Shoemaker The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an “application” of the risk management process as well as the fundamental elements of control formulation within an applied context.
CYBER MINDS: INSIGHTS ON CYBERSECURITY ACROSS THE CLOUD, DATA, ARTIFICIAL INTELLIGENCE, BLOCKCHAIN, AND IOT TO KEEP YOU CYBER SAFE Author // Shira Rubinoffr With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders. What you will learn •
The threats and opportunities presented by AI
•
How to mitigate social engineering and other human threats
•
Developing cybersecurity strategies for the cloud
•
Major data breaches, their causes, consequences, and key takeaways
•
Blockchain applications for cybersecurity
•
Implications of IoT and how to secure IoT services
•
The role of security in cyberterrorism and statesponsored cyber attacks
BUY THE BOOK HERE
BUY THE BOOK HERE
WOMEN IN SECURITY MAGAZINE
131
OFF THE SHELF
CYBERSECURITY IN OUR DIGITAL LIVES (PROTECTING OUR FUTURE BOOK 2)
THE ART OF EMAIL SECURITY: CYBERSECURITY IN SIMPLE TERMS
Author // Jane LeClair, Gregory Keeley, John Ashcroft
Author // Evgen Verzun
Did you know your car can be hacked? Your medical device? Your employer’s HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headlinemaking hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed clarification on the technology behind our daily digital interactions. They explain such things as supply chain, Internet of Things, social media, cloud computing, mobile devices, the C-Suite, social engineering, and legal confidentiality. Then, they discuss very real vulnerabilities, make suggestions about what can be done to enhance security, and offer recommendations for best practices. An ideal resource for students, practitioners, employers, and the general consumer of digital products and services.
BUY THE BOOK HERE
132
WOMEN IN SECURITY MAGAZINE
“The Art of Email Security” presents hard evidence of email committing high treason against your privacy, explains what makes you a possible target in the eyes of the attacker and shows what you can learn from online criminals to become more secure. To bring some spotlight on the importance of digital awareness in our tech-obsessed world, StealthMail Team launched the project and was later joined in this mission by leading cybersecurity experts across the globe. Chief information security officers that have worked for companies like Amazon, IBM, HBO, Gartner, UNICEF, DHL, Verizon, Capital One and many more were kind enough to share their knowledge and offer their unique insights, fueled by years of experience, and feedbackfrom-the-ground on email matters worth talking about. The material provided within the book allows privacy-oriented users of different Internet proficiency to get familiar with best practices of email security, learn about the most popular cyberattacks targeted at email, and find out why email is used so heavily by the most decorated hacking groups in the world.
BUY THE BOOK HERE
EVERYDAY CYBERSECURITY: A PRACTICAL APPROACH TO UNDERSTANDING CYBERSECURITY, SECURITY AWARENESS, AND PROTECTING YOUR PERSONAL INFORMATION AND IDENTITY. Author // Christopher Cox You are the target. Whether you’re a multi-millionaire, CEO, or work for minimum wage and don’t even have a bank account, you are a target of cybercriminals. Other than financial assets, your personal information, contacts, and computing devices all have value. We use computing devices everywhere, and most people don’t even consider the personal informational hazards their actions, or lack of action, can pose. There is a shortage of good cybersecurity awareness resources focusing on non-technical users, and a deficiency in resources teaching people how to better protect their personal information, and what to do if their information is compromised. There is a need for a more practical, easier-to-understand approach to cybersecurity for the common person.
BUY THE BOOK HERE
CONFIDENT CYBER SECURITY: HOW TO GET STARTED IN CYBER SECURITY AND FUTUREPROOF YOUR CAREER (CONFIDENT SERIES) Author // Jessica Barker Confident Cyber Security is here to help. This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies from Disney, the NHS, Taylor Swift and Frank Abagnale, as well as social media influencers and the entertainment and other industries, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. Let Confident Cyber Security give you that cutting-edge career boost you seek. About the Confident series... From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner’s resource for enhancing your professional life, whatever your career path.
CLICK HERE TO KILL EVERYBODY: SECURITY AND SURVIVAL IN A HYPER-CONNECTED WORLD Author // Bruce Schneier A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers―from home thermostats to chemical plants―are all online. The Internet, once a virtual abstraction, can now sense and touch the physical world. As we open our lives to this future, often called the Internet of Things, we are beginning to see its enormous potential in ideas like driverless cars, smart cities, and personal agents equipped with their own behavioral algorithms. But every knife cuts two ways. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
BUY THE BOOK HERE
HACKER, HOAXER, WHISTLEBLOWER, SPY: THE MANY FACES OF ANONYMOUS Author // Gabriella Coleman Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets.” Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semilegendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people.
BUY THE BOOK HERE
BUY THE BOOK HERE WOMEN IN SECURITY MAGAZINE
133
OFF THE SHELF
THIS IS HOW THEY TELL ME THE WORLD ENDS: THE CYBERWEAPONS ARMS RACE Author // Nicole Perlroth From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, governmentbacked market on earth-and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and nondisclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market.
BUY THE BOOK HERE
BROAD BAND: THE UNTOLD STORY OF THE WOMEN WHO MADE THE INTERNET Author // Claire L. Evans If you loved Hidden Figures or The Rise of the Rocket Girls, you’ll love Claire Evans’ breakthrough book on the women who brought you the internet--written out of history, until now. “This is a radically important, timely work,” says Miranda July, filmmaker and author of The First Bad Man. The history of technology you probably know is one of men and machines, garages and riches, alpha nerds and brogrammers--but from Ada Lovelace, who wrote the first computer program in the Victorian Age, to the cyberpunk Web designers of the 1990s, female visionaries have always been at the vanguard of technology and innovation. In fact, women turn up at the very beginning of every important wave in technology. They may have been hidden in plain sight, their inventions and contributions touching our lives in ways we don’t even realize, but they have always been part of the story. VICE reporter and YACHT lead singer Claire L. Evans finally gives these unsung female heroes their due with her insightful social history of the Broad Band, the women who made the internet what it is today.
BUY THE BOOK HERE
134
WOMEN IN SECURITY MAGAZINE
THE SMARTEST PERSON IN THE ROOM: THE ROOT CAUSE AND NEW SOLUTION FOR CYBERSECURITY Author // Christian Espinosa Cyberattack—an ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO. He describes why a high IQ is a lost superpower when effective communication, true intelligence, and self-confidence are not embraced. With his seven-step methodology and stories from the field, Christian helps you develop your team’s technical minds so they become better humans and strong leaders who excel in every role. This book provides you with an enlightening perspective of how to turn your biggest unknown weakness into your strongest defense.
BUY THE BOOK HERE
INVISIBLE WOMEN: DATA BIAS IN A WORLD DESIGNED FOR MEN
THE INSIDER THREAT: ASSESSMENT AND MITIGATION OF RISKS
Author // Caroline Criado Perez
Author // Eleanor E. Thompson
Winner of the 2019 Financial Times and McKinsey Business Book of the Year Award
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with usable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
Winner of the 2019 Royal Society Science Book Prize Data is fundamental to the modern world. From economic development, to healthcare, to education and public policy, we rely on numbers to allocate resources and make crucial decisions. But because so much data fails to take into account gender, because it treats men as the default and women as atypical, bias and discrimination are baked into our systems. And women pay tremendous costs for this bias, in time, money, and often with their lives. Celebrated feminist advocate Caroline Criado Perez investigates the shocking root cause of gender inequality and research in Invisible Women, diving into women’s lives at home, the workplace, the public square, the doctor’s office, and more. Built on hundreds of studies in the US, the UK, and around the world, and written with energy, wit, and sparkling intelligence, this is a groundbreaking, unforgettable exposé that will change the way you look at the world.
BUY THE BOOK HERE
BUY THE BOOK HERE
ETHICAL HACKING Author // Alana Maurushat How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise— which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions.
BUY THE BOOK HERE
WOMEN IN SECURITY MAGAZINE
135
SURFING THE NET
IDEASPIES With so much misinformation available, it’s getting harder (and more time-consuming) to sift through the rubble of daily content. But the right ideas and stories have the power to change our world for the better – if we know where to look for them. IdeaSpies takes the hard work out of finding and sharing good. They are an open innovation platform for clever ideas, new discoveries and original thinkers. Featuring simply written posts of 100 words or less, their stories aim to expand the mind and spark the imagination of all readers. Their blog covers a range of topics including data privacy, data science, Artificial intelligence, climate, finTech, new research, governance, healthcare, diversity, inclusion, startup, wellbeing, etc. They have got something for everyone!
READ BLOG
THE CYBER WOMAN The Cyber Woman was created to address the lack of female representation in the cybersecurity industry by sharing authentic stories of women who cyber. Cybersecurity is one of the fastestgrowing technology sectors but it only employs less than 10% of women. How can we ensure that we solve essential security problems, build great companies and products for everyone when such a significant part of the population isn’t a part of it? Here you will find insights and tips from the awesome 10%, the creative and influential women who rock in cyberspace.
READ BLOG
DEMYSTIFY CYBER Demystify Cyber’s aim is to demystify all things ‘cyber’ to support everyone to be safer online and when using technology. The website was started by Amanda-Jane Turner who first came across the idea in 2018 when she was lecturing a group of criminology students. What she thought everyone knew, about online safety and cybercrime, was not as common knowledge as she had presumed. Realising that increased interconnectivity and other advances in technology will also lead to an increase in crime opportunities, she was concerned that so many users of technology do not have the basic knowledge they need to keep themselves safe online. She started the Demystify Cyber project with the goal to help users of technology to better understand cybersecurity and stay safer from cybercrime.
READ BLOG
THE WOMEN IN CYBERSECURITY SOCIETY The Women CyberSecurity Society Inc. (WCSS) is a registered nonprofit community providing support, resources, mentorship, guidance and training to women, girls and minorities interested in advancing a career in cybersecurity. Their mission is to empower and support women and girls interested in a career in cybersecurity by removing roadblocks and obstacles. They enable women to continue the journey to become strong, confident leaders within cybersecurity of the future. They not only focus on empowering women but also focus on advancing their careers to the next level. You can learn from industry experts in-depth details about the cybersecurity industry.
READ BLOG 136
WOMEN IN SECURITY MAGAZINE
ARCHITECT SECURITY April C. Wright runs the Architect Security blog. She is a hacker, author, teacher, and community leader who has been breaking, making, fixing, and defending the security of global critical communications and connections for over 25 years. She is an international speaker and trainer, educating and advising on matters of privacy and information security with the goal of safeguarding the digital components we rely on every day. April has held roles on defensive, operational, adversarial, and development teams throughout her career and is currently a Senior Application Security Architect. Her blog is focused on “protective security” and is aimed at educating people (whether high executives or users) on how they can use simple techniques to be more cyber safe.
READ BLOG
WOMEN IN IDENTITY
PHISHING FOR ANSWERS Phishing for Answers is a blog site that provides information about cyber news, technology policy, and information security management. This blog is intended to inform every type of reader, from experienced professionals to career starters to people with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.
READ BLOG
Women in Identity (WiD) is a registered non-profit membership organisation, run by volunteers whose purpose it is to promote parity with respect to opportunity, reward, recognition and professional mobility in relation to gender, intersectionality, race, ability, ethnicity, sexual orientation/identity, creed, age or social status. They have an open forum for women in the identity sector to bounce ideas off each other, collaborate, and provide mentorship. They focus on supporting each other in gaining confidence to speak up - and speak out - at work, at conferences and in the media. Identity is all about recognising the individual human behind a transaction or interaction so they champion that systems designed FOR everyone should be designed BY everyone.
READ BLOG
FORRESTER Forrester is one of the most influential research and advisory firms in the world. They help business and technology leaders use customer obsession to accelerate growth by putting their customers at the center of their leadership, strategy, and operations. Their unique insights and blog posts are grounded in annual surveys of more than 675,000 consumers, business leaders, and technology leaders worldwide; rigorous and objective methodologies, including Forrester Wave™ evaluations; over 52 million real-time feedback votes; and the shared wisdom of our clients.
READ BLOG
SHECANCODE
ZD NET
DIGI.ME
SheCanCode started as a woman in tech blog and have evolved and grown their platform into an active women-in-tech support hub, providing tools and resources for women who are in careers in tech or are considering entering or transitioning into a career in tech. They have a community of over 130,000 users worldwide and see that increasing every day.
ZDNet brings together global news coverage and analysis on local and global IT Security industry trends and opportunities, to support IT Security Professionals and Decision Makers in their IT Security Buying Cycle process.
The Cyber Woman was created to address the lack of female representation in the cybersecurity industry by sharing authentic stories of women who cyber.
Their aim is to empower women to enter and remain in the tech industry as well as create a world wherein there is equal opportunity in the tech industry and gender does not need to be a conversation.
READ BLOG
Whether you want to follow hot topics or emerging trends or keep up to date with the latest news and events, ZDNet is the destination for professionals seeking to research technology-related issues and solve business technology problems.
READ BLOG
Cybersecurity is one of the fastestgrowing technology sectors but it only employs less than 10% of women. How can we ensure that we solve essential security problems, build great companies and products for everyone when such a significant part of the population isn’t a part of it? Here you will find insights and tips from the awesome 10%, the creative and influential women who rock in cyberspace.
READ BLOG
WOMEN IN SECURITY MAGAZINE
137
Save the date
The Australian Women in Security Awards are back for 2021. Join us in-person or via live stream to celebrate our community of Women in Security.
December 8th 5:30-10:30pm MORE INFO