Women In Security Magazine 06

Page 1

06

JANUARY • FEBRUARY

Choose to Challenge

W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M


FROM THE PUBLISHER I choose to challenge... because you can definitely do better

W

elcome to the final issue

they use to determine the skills a job requires, and

for the year – the one that

how they evaluate the people that could actually do

will lead us into 2022, a

the job.

year where I think we are all hoping to see more than a

Here’s a checklist that you can use when arguing for

little bit of change.

change within your HR organisation:

After two years of unprecedented challenges and constant disruption, it’s going to be a year when we all take stock of how far we’ve come, and what we need to do next to reach our goals.

• Up-skill line leaders to remove bias and focus on core competencies in job design • Write job ads to be gender-inclusive and welcoming to all • Design your job ads with role flexibility as the

Personally, I’ll be watching progress in five key areas where I choose to challenge you to do better in making progress towards gender equality, diversity, and inclusion.

starting point which enables flexible working • Broaden the focus on technical skills, as most roles require this • Focus on the desired impact/ outcome of the role, not just the skills and experience that you

These include:

think are needed. • Engage individual hiring managers to help them

HR DEPARTMENTS AND RECRUITERS

understand that pure technical experience

Despite constant claims about cybersecurity

shouldn’t be the only screen for possible

skills gaps, companies continue to push out job

candidates

advertisements filled with laundry lists of esoteric

• Consider requesting gender-blind applications

skills that few candidates possess – convincing them

• Develop and execute a segmented employment

of their inadequacy before they even get a chance to plead their case.

brand aimed at target populations (such as women and other diverse groups) • Identify key female talent within your

Many potential candidates, women in particular

organisation and encourage them to apply

but also those from neurodiverse, gender diverse

(including any employees on parental leave)

and other backgrounds, report being intimidated by conventional recruitment processes.

• Resist ‘referral cultures’ that might unconsciously result in homogenous teams. Where employees are encouraged to make

Companies need to think more about how they are engaging with potential job-seekers, what processes

referrals, ensure there is rigour in the process • Invite potential recruits into your workplace so they can experience the working environment,

2

WOMEN IN SECURITY MAGAZINE


Abigail Swabey

meet future colleagues, and discuss any

If diversity truly matters to you,

questions or concerns about an advertised role

here is a checklist of things you

• Consider interview panel composition for

can do to help:

diversity and gender-balance, section or departmental diversity and/or external

• Listen.

perspective

• Attend a bias training to educate yourself

• Train interviewers to uncover nontechnical merit objectively instead of relying on gut instinct or ‘fit’ • Review pay offerings to eliminate like-for-like gender pay gaps in the salary offered to the candidate

on the systemic inequalities that exists so that you are better equipped to help • Make sure women’s ideas are heard. • Celebrate women’s accomplishments by maximising their visibility • Follow diverse voices

We need to start addressing the bias itself at its roots

• Encourage more women to go for it, be it change of

so that people actually make the right decision in the

roles, further upskilling, a job they wouldn’t usually

first instance.

go for, or moving into security. • Give direct feedback

Choose to challenge yourself. Try to understand

• Mentor women

where biases come from and how they affect your

• Choose individuals to help grow, enable, and

hiring decisions, so you can help your business take

develop within our industry

that next step towards discarding unconscious bias.

• Help educate these individuals on where the gaps

CHAMPIONS WHO AREN’T REALLY CHAMPIONING

• Sponsorship can open doors like nothing else.

are and what they need to do to improve Having someone to back you and put themselves

There are real champions for women in security and

out there for you can create opportunities that

a more diverse workplace – and then there are the

wouldn’t come about otherwise. Sponsors should

individuals and companies that like to talk about how

also help the individuals navigate the system, teach

they champion diversity and inclusion, but actually do

them how to read a room, and create connections

relatively little about it.

and opportunities for them.

Stop posting diversity memes on your socials and

Awareness is great, but it’s not going to get us across the

start considering how you can be a champion for

finish line. As Alan Armstrong put it:

women, and other marginalised groups, every day. How many individuals have you really helped get to the stage that have been recruited into a role they wanted, and offered guidance; supported; elevated; advocated for; given a job to? This isn’t about you, or what people think of you. I challenge you to walk the walk as well as talking the talk.

“Champions do not become champions when they win the event, but in the hours, weeks, months and years they spend preparing for it. The victorious performance itself is merely the demonstration of their championship character.” WOMEN IN SECURITY MAGAZINE

3


keeping their behaviour out of the limelight, they must have a spotlight shone right on them when you see it happen and call them out for what they are • If your company does nothing about those bullies and harassers, we will start industry registers across associations worldwide to get them involved and speak up when you can’t. Don’t rely on others to fix the problem. Truly courageous individuals call out behaviour from a place of kindness, encouraging bullies to appreciate

EVERYONE TO CALL OUT INAPPROPRIATE BEHAVIOUR

the impact their choice of behaviour has on you and

Toxic behaviour is everywhere, but women shouldn’t

open, everyone can deal with the behaviour and move

have to put up with it when at work trying to be their

on, openly and constructively.

on others. If you have those conversations out in the

best selves. So stop standing on the sidelines, and start intervening when you see toxic behaviour.

SENIOR LEADERS TO ELEVATE AND MENTOR It’s hard to overstate how important mentorship can

All organisations are made up of human beings, and

be to women – or to any employee, for that matter –

sometimes they behave in less than acceptable ways.

in helping them establish their careers and even their

Do you really want to keep looking the other way?

sense of themselves. The approval and support of senior staff is easy to provide and can make all the

Think about the last time you saw behaviour that

difference – so why aren’t you getting your mentor

made you uncomfortable. What did you do?

hat on?

Did you call out the offender on the spot? Did you talk

This year, I had the opportunity to mentor an

about it after the incident with your friends? Did you

individual outside of my organisation. Sometimes

report it to a manager? Go to HR?

it was fun and sometimes scary. I didn’t think I was ready – but I did it. I learned a lot about my mentee

It’s one thing to understand that toxic behaviour in the

and myself, and I ended up with a new friendship

workplace is wrong – but something else entirely to

and new insights into ways I can evolve and help my

fix it.

community more.

Here are a few things to remember:

Being a mentor is being a trusted advisor. It means making yourself available to support and advise

• Leadership isn’t about titles, but more about

someone when they need it, delivering that support in

actions and activities. By speaking up, you are

a way that makes sense to them, and always keeping

setting a new standard and redefining what

that person’s best interests in mind.

leadership is in your workplace. Call it when you see it • Your co-workers are looking for role models,

It’s a long-term commitment where you will come to know and understand your mentee’s personality,

and once the role models appear, the followers

learning style, and goals – which will help you offer

get onboard. Once that happens, we have a

richer, more relevant advice over time.

movement – and it will quickly become ‘the way we do things around here’ • Those who bully and harass are experts at

4

WOMEN IN SECURITY MAGAZINE

Here are a few tips for being an effective mentor:


• Approach each mentorship differently, everyone

complicating

is unique. It’s important to take the time to think

things

about what kind of commitment you want to

needlessly.

make.

They’re automating

• Set expectations in the beginning.

themselves into a corner

• Take a genuine interest in your mentee as a

by adopting AI to screen

person

resumes, disqualifying people

• Know when to wait before giving advice

before they even get a chance to

• Don’t assume - ask

argue their case.

• Be forthcoming about your own career mistakes as that helps build trust, gives them permission

Holding out for the perfect candidate is a

to share their own mistakes, and strengthens the

fool’s game these days. As Darryl Kerrigan

relationship

would say: tell ‘em they’re dreaming!

• Celebrate their achievements • Seek out classes or projects related to skills your

Companies need to learn to manage the risks of new

mentee wants to develop - to look for situations

hires rather than trying so hard to eliminate them that

- create situations - where mentees can get

they get caught in decision paralysis.

involved to learn some of the skills they’ve been hoping to learn.

And don’t get me started about companies that are

• Give them long-term guidance

looking past qualified visa holders just because they

• Lead by example

aren’t citizens. It doesn’t mean they are automatically going to run and take your training and development

Stop trying to manage and motivate employees with

dollars with them.

group emails and cute pictures of cats. Roll up your sleeves and lead from the front, so your employees

Is that really what is happening? Attrition can happen

know you are fighting for them every day, and you’ll be

with any candidate, so either way it’s a risk. But

amazed at what you can accomplish together.

maybe they will surprise you.

COMPANIES TO TAKE A CHANCE

I practise what I preach and have hired a full time

With the borders effectively closed for most of the

event and marketing specialist on a visa, as she was

past two years, Australian companies have had to get

the best person for the job. She knew my business

creative about the way we hire people. We need to

inside out, is exceptionally hard working and is a very

keep the businesses going, right?

valuable asset to my company.

Maybe, just maybe that person who shows great

Treat your employees right and they will become

promise, initiative, and potential will still be a valuable

valued members of your business, no matter what

employee even if they don’t have a laundry list of

boxes they tick or don’t tick. I’m a small business that

technical certifications that would let them hit the

managed to see past that bias – so why can’t you?

ground running. Yet many companies are still falling back on the old recruitment practices – posting long, complex job ads with demands for years of experience and capabilities

Abigail Swabey PUBLISHER, Owner & CEO of Source2Create

that very few people have, here or overseas. www.linkedin.com/in/abigail-swabey-95145312/

HR departments are overriding well-meaning managers that have simplified their job descriptions,

aby@source2create.com.au

WOMEN IN SECURITY MAGAZINE

5


CONTENTS

2

COLUMN New year — old cybercrime

PUBLISHER’S LETTER

16

Tracking apps for tweens’/teens’ devices

62

Financial services to cyber…. A journey has begun

REMEMBERING KYLE MAHER: A LIFE LIVED WELL AND TO THE FULL, BUT ALAS TOO SHORT | P10

Every CISO’s nightmare

12

I CHOOSE TO CHALLENGE… COMPANIES TO EXPAND YOUR THINKING

65 106

INDUSTRY PERSPECTIVES Why do I feel like a fraud? Imposter syndrome and cybersecurity — why they go hand in hand

67

Inspiring Girls

70

Data centric storytelling for cyber security

I CHALLENGE… HR DEPARTMENTS AND RECRUITERS

Friends, colleagues, red and blue teams, lend them your ears!

80 WHAT’S HER JOURNEY?

CAREER PERSPECTIVES

get more girls entering male-dominated industries

78 84

Cozmos: choosing to challenge a platform built with diversity and inclusion in mind

44

86

Cyber resilience is not a trend but a

Top 10 recruitment challenges to tackle in 2022

47

Diversity and inclusion

50

#IChooseToChallengeThere is 52

Five ways to ensure your recruitment process is gender neutral

54

How to win in the war for talent

56

Take a chance to find out the most suitable new talent

UNIQ You’s mission:

and they will come

space from a non-traditional cyber

Not One Path to Enter Cybersecurity

76

Build interest

How to join and contribute to the cyber background

73

60

necessity 90 Understanding the Dynamics

Nivedita (Nivi) Newar

20

Amy Hewson

23

of the Security Organization

Dr Alana Maurushat

26

The search of the criminology

Emily Hunt

28

in private sector in spain

Emily Baker

31

Top 5 trends and predictions

Bridget Mitchell

33

for Australian boards and

Wendy Thomas

35

company directors managing

Anita Siassios

38

cybersecurity risk in 2022

100

Rebecca Moonen

40

Choosing to challenge

103

Kelly Peck

42

92 98


JANUARY • FEBRUARY 2022

FEATURE I choose to challenge… Everyone to speak up

94

I choose to challenge... Mentors to step up

107

I choose to challenge... Champions who aren’t really championing

114

STUDENT IN SECURITY SPOTLIGHT Ritu Dahiya

126

Davinia Szetu

129

Yonitha Thava

132

FOUNDER & EDITOR Abigail Swabey

ADVERTISING Abigail Swabey Charlie-Mae Baker Vasudha Arora

JOURNALISTS

TECHNOLOGY PERSPECTIVES

David Braue Stuart Corner

Cyber security governance, risk and compliance and The Art of War

111

The link between corporate

SUB-EDITOR

134

Stuart Corner

governance and effective security governance

DESIGNER

118

Do Your Part. #BeCyberSmart.

120

150

Jihee Park

Women in Security Magazine is published by Source2Create

TURN IT UP

144 Source2Create Pty Ltd is the publisher of this magazine and its website (www.womeninsecuritymagazine.com). AWSN is the official partner of Women in Security Magazine

SURFING THE NET

148

OFF THE SHELF

146

©Copyright 2021 Source2Create. All rights reserved. Reproduction in whole or part in any form or medium without express written permission of Source2Create is prohibited.


O T E B I E R N I C Z S B A U G S A M R U O n ditio e n the iss a o m t r cribe Neve s b u n! S y for a d agai o n ine t z a es o t g a a d m e up v and i s s u t l n c e ex g ev n i m ong l o a c , p s u ssue i nt. e e r t u n t co fu nus o b with

04

EMB

OBER OCT ER •

THE ING SOLV IP E L IN E P LEM B O PR P82

CT A R T AT

SEPT

AI N -

SUB

SC

NO E B I R

W

DE

VELOP

A G IN IVIN THR ANDEMICE P L T IB S X PO F L E K IN G W O R E NT M N P60 IR O ENV

WW

W. W

EN OM

INS

ECU

RIT

YM

AGA

ZIN

E.C

OM

02

MAY

THE ARE BEW LIANT R IT Y BRIL E R S E C U CYB JERK P16-1

8

N • JU

E

FIN TA IN S

P


Connecting - Supporting - Inspiring AS A FORMAL MEMBER, YOUR CONTRIBUTION ENABLES US TO BUILD AND SUSTAIN A STRONGER FUTURE FOR OUR INDUSTRY

With an affordable annual fee, AWSN members will have access to discounts on programs and industry events, the membership Slack space, post or share job opportunities, and receive our monthly and any special edition newsletters. Memberships are now a 12-month cycle Corporate packages available Learn more at www.awsn.org.au/members/join/

04

EMB

OBER OCT ER •

THE ING SOLV IP E L IN E P B L E M82 PRO P

CT A R T AT

SEPT

DE

ACT - R R T

AI N ET

VELOP

A G IN IVIN THR ANDEMICE L TP POS F L E X IBIN G K W O R E NT M P60 IR O N ENV

AT

BER G CY ’S NDIN T- W H AT T ALENE S E C R E H T N C E? SAU

P46

IN ENT STUD R IT Y U S E C T L IG H T SPO P97

WW

O W. W

MEN

INS

ECU

RIT

YM

AGA

ZIN

E.C

OM

Thank you to all our amazing sponsors for their generosity and for helping us to CONNECT, SUPPORT and INSPIRE our members https://www.awsn.org.au/s upport-us/sponsors/


REMEMBERING KYLE MAHER: A LIFE LIVED WELL AND TO THE FULL, BUT ALAS TOO SHORT by Amanda Turner and Cody Byrnes

C

ybercrime is evolving as fast as new

eclectic pursuits, he put his whole self into everything

technology emerges, and it takes

he did. He was tireless and driven to succeed, and to

concerted effort from committed

help others be their best.

and highly-skilled people to keep our communities, nations and world cyber

Kyle always had a cheeky grin, was always ready for

safe. The cybersecurity industry is in

some fun, and truly believed in his family and friends.

desperate need of passionate people who are driven

If you were his friend, you had the most loyal, loving,

to keep learning, to keep supporting others, and to

kind, highly intelligent and mischievous person at

keep being warriors for the good. We had the privilege

your side.

of knowing just such a person, and the honour of calling him our friend and brother. We have vowed to

Listing Kyle’s

ensure he is never forgotten and his legacy lives on.

achievements would take an entire page,

Kyle Maher (1989-2021) was a man of many

but still fail to quantify

achievements: scholar, Australian Defence Force

the impact he had

member, motorcycle champion, mentor, highly skilled

on people. A simple

cybersecurity professional, animal lover, family man,

example of this is how

friend.

Kyle knew Mandy loved cinnamon buns, and

10

Kyle was champion of all and to all. He was inclusive,

if she was tied up in a

kind, loving, passionate about helping his community,

meeting, he would take

new motorcyclists, his colleagues, his family and

photos of them at a cafe

his friends, in any way he could, and committed to

and send a photo saying

protecting businesses from cybercrime. With many

he had eaten them all.

WOMEN IN SECURITY MAGAZINE


T R I B U T E

He would then arrive with a coffee and a bun for

cybercrime against everyday people. Kyle showed

Mandy as she returned from her meeting.

Cody his method of protecting these companies, and on Tuesday 2 November 2021, Kyle and Cody agreed

Keen to help students and his friends, Kyle would

to start another company, BEST-Sec, to help better

happily help Mandy when she was lecturing university

protect everyday people against cybercrime.

students in criminology. She remembers with much amusement the time he popped his head around the

Kyle unexpectedly left us on that Friday.

door to greet her students, sidled up to her, gave her a quick hug, and whispered that the scene reminded

Losing him is tragic. He was a much-loved brother to

him of a ‘Harry Potter’ class. As he backed out of the

us, and we feel the loss every day, but we don’t want

room laughing he asked if she was going to teach

this to be sad. We want this to be a positive reflection

spells as well as cyber criminology. Then he closed

on a life well-lived, and we want to highlight how he

the door with a huge grin on his face, suggesting she

spent so much of his time helping other people. We

could open a cybersecurity wizarding school and he

want to inspire others to be the best they can be and

would be in charge of the ‘sorting hats’.

to do what they can to make the world a kinder, safer and more cyber-secure place.

To meet his commitment to helping his community,

Kyle has left a huge void in the world that we

Kyle had started a secure

all need to step up and fill. Let’s be kinder, more

development company

supportive people, and let’s ensure we all do our bit as

called BEST-Dev, aimed at

cybersecurity warriors. Help each other, protect each

helping small businesses

other, and stand up for what is right, not what is easy

secure IT in a way that would

– just as Kyle did.

otherwise be out of their price range. Combined with

Light up the darkness.

Mandy’s Demystify Cyber project, Kyle’s company contributed to combating

WOMEN IN SECURITY MAGAZINE

11


I CHALLENGE… HR DEPARTMENTS AND RECRUITERS by David Braue

How can we improve diversity if recruitment never changes?

G

oogle ‘HR DEI initiatives’ and you’ll

Consider the Commonwealth Bank of Australia, which

find millions of web pages purporting

has been in hiring overdrive over the past 18 months

to help you integrate diversity, equity,

to support its pandemic-era digitisation – quadrupling

and inclusion (DEI) initiatives into

its hiring to the point where it has been recruiting

your human resources processes.

around 100 software, analytics and other engineers per month.

Yet while the answers may be there

waiting for you, the fact that you’re still having to look

Some 53 percent of these were existing employees

it up begs yet another question.

who were reskilled through an 8 to 12-week program,

After more than a decade of open discussion about

with group executive for human resources Sian Lewis

the importance of gender equality, why are you still

recently relating the company’s efforts “to encourage,

having to figure out how to make your HR department

particularly, women and girls to look at STEM and

more diverse?

become excited about joining that line of education where the opportunities are great.”

Shouldn’t this issue have been resolved years ago?

12

Turns out that there’s a long way between knowing

“We’re building our own in a way that perhaps we

DEI is important and actually changing the world –

haven’t traditionally done as well,” she told Gartner

and HR departments are struggling to bridge that

VP research and advisory Aaron McEwan during the

gap, even though they know they should.

firm’s recent IT Symposium.

WOMEN IN SECURITY MAGAZINE


F E AT U R E

“We’re inching our way along” with programs for

said their number-one priority in 2022 will be building

indigenous trainees and other underrepresented

critical skills and competencies, fully 47 percent

groups, Lewis said.

admitted they don’t even know what skills their employees are lacking.

“We’re exploring different thinking styles that could be applied to technical areas, and there’s a lot of

That’s not exactly reassuring news from HR

thinking that the HR professional needs to do about

professionals who are, more often than not, still

job design, so that we can actually take advantage

in charge of managing recruitment for what – in

of different skills and find ways where they can

cybersecurity, analytics, AI and many other critical

contribute.”

areas – are often technical positions where an appreciation of relevant skills is more than just a nice-

WHERE ARE THE SKILLS GAPS?

to-have.

If one of Australia’s largest companies is still trying to figure out how to be more inclusive, what hope is

Indeed, where cybersecurity operations have already

there for the rest of us?

well recognised the growing need for gender diverse, ethnically diverse, neurodiverse workforce to match

Not as much as you’d like to believe, if the results of

the equally diverse skills of the cybercriminal

a recent Gartner TalentNeuron survey of HR leaders

gangs targeting them, many are finding themselves

are any indication. While 60 percent of respondents

stymied by HR departments that continue to manage

WOMEN IN SECURITY MAGAZINE

13


recruitment using the same old time-honoured

Despite their inability to paint the right image to

gatekeeping techniques as they have for many years.

attract female candidates, many companies do tell Burke that they do want women in the roles if

“Organisations have often been guilty of looking in

possible.

the wrong place for the wrong people with the wrong skills,” said Gartner research director David Gregory,

“We have conversations where companies say ‘we are

“and all of our data suggests that this is a trend that

looking for this person, and if they just happen to be

will continue.”

female, that would be perfect’,” he told a recent AISA Cyber Conference 2021 panel. “That happens six or

“There are underlying problems that are holding

seven times out of 10 – so there is a real and genuine

organisations back from getting the right people,” he

demand for attracting women into the industry.”

continued. “We rely on the same recruitment process,

Yet just being eager to hire women is only the

even though it is never guaranteed that we end up

beginning, with applicants getting tired of fighting

with the right candidate. And it’s fair to say that

entrenched, biased legacy recruitment systems – and

success rates have sometimes been patchy at best.”

ready to go elsewhere if they smell a rat.

Recruitment consultants report getting position descriptions and vacancy notices from companies

In one recent survey, fully half of the job candidates

asking for too many skills, the wrong skills, too much

said they would discontinue their application if they

experience – and describing roles using gendered

felt they had been biased against while interacting

language that can turn off potential applicants before

with hiring managers.

they’ve even submitted their CVs. Many times, technologists are trying to override the HR hegemony by rewriting job descriptions in a more accessible way: who better to know what the job entails, after all, than the people that perform it? Yet even where well-intentioned colleagues step in to improve the recruitment process, many times the HR departments override the changes – leaving changeminded departments struggling to attract qualified women and DEI-minded HR departments struggling to meet their self-imposed goals.

POWER TO THE PEOPLE Cybersecurity remains a sellers’ market – and in a market where Australians are increasingly prioritising jobs that pay well and give them purpose, companies need to implement a culture attractive enough to win over staff looking for a place where they will feel valued. “For attracting females or certain skill sets, companies are going to have to pay more and make it worthwhile,” said Ricki Burke, director and founder of recruitment firm Cybersec People, noting that new hires are generally looking for salary increases of around 20 percent when switching jobs.

14

WOMEN IN SECURITY MAGAZINE


F E AT U R E

PAVED WITH GOOD INTENTIONS

This could become problematic in the near future

Many companies do want to do away with entrenched

given “rising pressure to make progress on DEI,” Mark

institutional bias, Gartner TalentNeuron found,

Whittle, vice president of advisory within Gartner’s HR

although just 35 percent of survey respondents – one

practice, warned that “HR leaders need to determine

in three – said that DEI would be a top priority for their

which future of work trends have altered, and will

HR organisations in 2022.

alter, their organization’s strategic plans and what immediate and longer-term workforce adjustments

Worse still: with 48 percent focusing on organisational

are required as a result.”

design and change management, 45 percent set to focus on the leadership bench and 42 percent

For many valuable potential employees, DEI

focused on the future of work, many HR leaders

programs are becoming a key recruitment tool and

seem content to focus on these issues without also

their effectiveness will factor into decision-making

factoring DEI into their plans.

about which company is worth working for. Fully 90 percent of employees expect employers to engage

“There are underlying problems that are holding organisations back from getting the right people. We rely on the same recruitment process, even though it is never guaranteed that we end up with the right candidate. And it’s fair to say that success rates have sometimes been patchy at best.”

externally in DEI initiatives,

- Gartner research director David Gregory

company has stated its desire

McKinsey & Company recently reported – yet while 40 percent of companies reported increasing their investment in DEI initiatives, 86 percent reported challenges executing those strategies. However, explicitly your to improve DEI during 2022, resolving many of those challenges will be crucial to ensure that you remain

competitive in a labour market that is increasingly intolerant of inertia in HR. And because HR’s primacy in recruitment effectively makes it the custodian of company culture, efforts to fix lingering DEI obstructions should start there and rapidly expand across the company. The key is to try – and keep trying until you succeed, one way or another. “Now more than any other time, there is no right answer,” said CBA’s Lewis. “There are just judgement calls to be made, lessons to be learned and tacks to be changed if you find that you’ve gone off in the wrong direction.”

WOMEN IN SECURITY MAGAZINE

15


AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist

C O L U M N

New year — old cybercrime Cybercrime is big business, thanks to technical advancement and interconnectivity creating more opportunities for cybercriminals. This regular column will explore various aspects of cybercrime in an easy to understand manner, to help everyone become more cyber safe. A new year brings an old cybercrime campaign with

for a competition you did not enter.

the classic phishing scam. Criminals often look for a

• Keep your devices up to date. Keep your OS and

quick win, and nothing says quick win quite as much

software patched, maintain your antivirus, and

as a massive phishing campaign. So, while a new year may see new resolutions, criminals may decide

regularly check for updates. • Regularly check your accounts. Check your

to keep going with some old scams they know will be

financial accounts and other online accounts

successful.

regularly to ensure that changes have not been made without your knowledge.

Phishing scams are becoming increasingly

• When in doubt, don’t! If you are unsure about a

convincing, and the old tips of looking for incorrect

message, don’t open or respond to it, and don’t

spelling and bad grammar may not apply in all cases.

click on any attachment.

Phishing emails these day tend to be well-crafted and very convincing, often imitating official business

If you have been impacted by cybercrime in Australia,

messages right down to using the relevant logos and

you can report this via http://www.cyber.gov.au/

including warnings to ‘beware of scam emails’.

acsc/report. In other countries, report it to your local

Phishing attempts can trick even the most cyber

police or through the relevant cybercrime reporting

savvy among us, particularly if the email looks like

mechanism.

one you are expecting, and you receive it on a bad day!

Phishing scams are big business – stay safe.

Make a resolution to be vigilant with emails

This cybercrime column is dedicated to the memory of Kyle Maher (1989-2021).

• Check the sender’s email address, not just the sender’s name • Don’t share sensitive information • Don’t fall for URGENCY • Hover, but don’t click. Hover over URLs. If the hovered text does not match the display text, or if it seems strange, DO NOT click on it. • Attachments can be dangerous. If the file asks you to enable macros to view it, don’t. • Is it too good to be true? Prizes and money may be used as bait. Remember you can’t win a prize

16

WOMEN IN SECURITY MAGAZINE

www.demystifycyber.com.au/


Easy Reliable Resourceful No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY! www.source2create.com.au

charlie@source2create.com.au

aby@source2create.com.au

vasudha@source2create.com.au


Source2Create Spotlight

Advertising The market is saturated, so how can you position your company’s product or service strategically to your audience to stand out from the clutter? At S2C, we position your creative and content across a mixture of media to generate more excitement and better engagement from your target audience. We explore a range of ideas with our clients to spread their message – the right way.

REACH OUT TODAY www.source2create.com.au

charlie@source2create.com.au

aby@source2create.com.au

vasudha@source2create.com.au


WHAT’S HER JOURNEY?


position. “It is a very attractive role and has a broad set of responsibilities including cybersecurity strategy, governance, risk, compliance management,

Nivedita (Nivi) Newar Head of Cyber Security Strategy & Governance at UNSW

controls assurance, security awareness and enterprise security architecture,” she says. For anyone aspiring to a similar role, she has some advice. “You need to gain broad exposure and work experience in governance (policy, advisory, assessments), risk management and architecture. Ideally, you will need to be either a governance and

B

risk manager or an enterprise security architect with people management experience to be able to eing recognised as a high potential

naturally progress into a role like mine.”

employee after joining Vodafone as a Security Specialist reporting to the CISO,

However, out of all these skills, it was her people skills

was pivotal to the progress of Nivi’s career

that faced the biggest challenge: “influencing the right

in cybersecurity.

people to join the team.”

As a result of this recognition, management worked

In the face of elevated threat levels, she says

to fast-track her career progression. “I was mentored

“Management Boards are demanding that the

by the CIO in 2018 and 2019. Within a year of joining

timeframe to deliver security programs be cut in half:

Vodafone, I was promoted to the Enterprise Security

from three to five years down to two or less.”

Architect position,” she recalls. “The remit of the role later expanded to Technology Security Strategy

CHANGING SKILL REQUIREMENTS

and Architecture Lead (manager) with people

“This change is driving the demand for Australian

management responsibilities.”

permanent residents and citizens with niche cybersecurity qualifications, specific subject matter

After four years with Vodafone, Nivi joined UNSW

expertise and ample experience in delivering security

as an Enterprise Security Architect (cyber security

solutions within the specific industry.”

manager) at a time when the education industry was being hit hard by nation-state cyber threats, and by

And in addition to this requirement for ‘program’ team

COVID-19.

members, there are same demands from ‘business as usual’ teams. “The program team needs direction

RAPID PROMOTION TO LEADERSHIP

from the senior members of the business-as-usual

In adversity, she saw opportunity- an opportunity to

teams that will eventually own the service/product

make a positive difference when staff were leaving

after operational handover from the program team,”

to join the banks, telcos and other IT businesses

she explains. “Therefore, there is need for the same

flourishing because of the pandemic. Within five

set of hiring criteria for the senior BAU roles for the

months of joining UNSW, she was offered the acting

program to be delivered at the required pace.”

Head of Cyber Security Strategy and Governance

20

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

Nivi’s current appointment represented the fulfilment

CHOOSE YOUR BOSS CAREFULLY

of an ambition born when studying for an MBA in

In the light of this, it is perhaps not surprising her

IT specialising in networking and IT infrastructure

number one piece of advice for aspiring cybersecurity

and being introduced to cybersecurity during these

professionals — not always easy to follow — is to find

studies.

the right manager to work for. “You must choose a very accomplished, self-confident and genuine leader.

“I wanted to pursue a career in cyber, to solve the

Because only the person that has no insecurities and

many problems/challenges in an industry faced with

is truly confident of his/her own abilities, will happily

complexity, gender imbalance at senior management

promote you. When applying for a role, request

level, the rapid evolution of the threat landscape, and

informal catchup with the hiring manager to have a

skills shortage,” she explains.

free-flowing discussion.”

AUSTRALIAN RESIDENCY, AND MICROSOFT

And she has plenty more advice for aspiring

She studied for her MBA in her native India and after

cybersecurity professionals.

graduation moved to Dubai to take on an engineering role in the satellite communications industry. In 2015

First research about the full scope of cybersecurity

she was granted permanent Australian residency and

careers on https://cybersecurityguide.org/careers/.

joined Microsoft Australia as a Network, Infrastructure and Security specialist.

Identify those that interest you.

She has nothing but praise for her current boss

Reach out to experienced professionals in that

at UNSW, the CISO, describing him as “a rare mix

specific area via LinkedIn to walk you through what

of incredibly experienced in his craft as a CISO,

the day-to-day job in those roles looks like.

extremely talented, level-headed, calm, composed, competent, and the most-humble leader I have met in

Based on what stream you want to pursue, find a

my limited experience.”

mentor that can not only guide you but also showcase the relevant processes and technology.

“He has showcased immense faith in my abilities, admired me, recognised my talent, proactively sent

You must also seek opportunities to undertake

out recommendations, rewarded me, uplifted me,

internships or secondment to get a sense of whether

given me authority, charge, exposure, visibility, treated

you are passionate about that specific role within

me as an equal, and without asking has provided

cyber security.

me with opportunities he believes I deserve. I count myself very blessed. I continue to learn from him

“Once you are working with the cybersecurity

every day.”

team, you need to treat this like a once in a lifetime opportunity and do your best to explore every area

And it seems Nivi is not alone in her assessment. “His

of cybersecurity by requesting process and tool

leadership is such, when he joined UNSW, 11 staff

walkthroughs, so you can visualise it,” she says.

from his previous organisation followed him within a span of two to three months.”

“You will be surprised how willing team members are to educate and guide you in the right direction.

WOMEN IN SECURITY MAGAZINE

21


So never hesitate to ask. What’s the worst that can

she would otherwise have to deal with. If you want to

happen? Out of 10, two will be unwilling, two will

build your career around a specific role and you have

dodge you, but six will give you, their time. Remember,

these qualities, it will not be hard to create that role.”

if you take initiative, you always win.” And another valuable lesson is not to allow anyone or

NEVER SAY ‘NO’

anything to limit your progress.

“One rare advice that I would like to give you is never saying no to a new task, take initiative, say ‘yes’ when

“I spent four years in a previous role, waiting in

given an opportunity to demonstrate your abilities to

vain for company-sponsored cyber training and

an audience you have never been exposed to, go in

certification. It limited my marketability. One day, I

prepared, deliver and repeat.”

decided to stop waiting and take charge.”

“Take the opportunity to strike a meaningful

EDUCATION OVERLOAD, PLUS PARENTING

conversation with your cybersecurity senior leaders

“I was determined to take this situation as a challenge

from time to time when you cross paths around the

and undertake all career-relevant training in one go.

office kitchen area, printer areas, lifts etc. First find

With a six-month-old baby in my arms, I completed

out about what’s top of their minds, what keeps them

five of the most challenging industry certifications

up at night.”

in five months: CISSP, CISM, SABSA, AWS Cloud and CCSK. It’s hard to fathom how I managed this, but I

“Perform a SWOT analysis or request a cyber team

hope it inspires others: if you have the will, you have

member to walk you through the latest capability

a way.”

maturity assessment to understand the gaps. This is the time to seek advice from your mentors on what is

She wants to gain more knowledge in DevSecOps

relevant to the senior leaders in the bigger scheme of

Automation, Implementation of Zero Trust and SASE

things.”

architectures, nation state-sponsored cyber warfare, threat intelligence, cyber-attacks using personal

“At the next few encounters with the senior leader,

mobile devices and 5G powered IoT.

share your knowledge of the gaps in terms of risk and trigger a discussion about what leadership team

She believes, “AI in combination with machine

plans to do to buy down the risk. Subtly express your

learning has brought tremendous changes in

interest in permanently joining the team. Request

cybersecurity particularly to security orchestration,

for a meeting with the leader that has the decision

automation and response (SOAR) capabilities. But

making and hiring authority and go in with a proposed

more importantly, it is being used to develop smart

plan on what problems you would like to solve and

malware and attacks to bypass the latest security

how you would like to contribute.”

protocols in controlling data. I intend to gain more exposure to this technology.”

CREATE THE ROLE YOU ENVISAGE An overarching strategy, she advises, is that each individual should aim to create the role they want. “I have always believed in creating my next role. A manager always desires and relies most on staff that are proactive, responsive, aligned to the vision of the company and the team, do not have to be directed each time, can take ownership and run the show, because that relieves the manager of things he or

22

WOMEN IN SECURITY MAGAZINE

www.linkedin.com/in/nivedita-newar/


W H AT ’ S

H E R

J O U R N E Y ?

“We researched, worked hard and refined our tender so that it would stand out amongst our competitors. We tenaciously held on to the belief that we had the skills, experience and integrity to be the leading company in the Australian security vetting industry. And it all paid off because we won the contract.”

A FAMILY BUSINESS MPS was founded by Hewson’s mother, Tracey

Amy Hewson CEO, Mitchell Personnel Solutions

Mitchell, and her business partner, Karen Bradley, in 2006. Being founded by women and run by women did not give the fledgling company a good start in the male-dominated security industry. “Initially we were not taken all that seriously. However,

I

we had a desire to succeed,” Hewson recalls. “We knew our strengths lay in our experience, expertise magine this. You are one of only 22 businesses providing a highly specialised service for which there is only one customer, the Federal Government. Then, one day that customer decides it is going to give 16 of you the flick, and award

future contracts to six only.

and willingness to seek professional advice to ensure the stability of the business. We also knew we had found a gap in a niche market that was big enough to ensure our growth.” She became CEO in 2011 after joining the company in 2007 in the newly-created role of security vetting

That, says Amy Hewson, CEO of Mitchell Personnel

officer trainer. Prior to that, she worked in a training

Services (MPS), was the scariest moment of her

position in the Public Service.

career. The high point? Being one of the six chosen. “As one of the first outsourced companies to provide MPS provides security vetting services for the Federal

security vetting, MPS decided to introduce mandatory

Government through the Department of Defence. “Our

vetting officer training,” Hewson says. “By doing so,

core activity is to assess an individual’s suitability to

we knew it would give the protective security industry

access nationally classified and sensitive information

a level of respect and provide confidence for our

and make a recommendation to either grant or deny a

client, the Federal Government, in the work we were

security clearance,” Hewson explains.

undertaking. This training was later adopted by the whole industry.”

“Through extensive background checks, interviews and fact gathering, we mitigate risks to ensure an

STAFF SUPPORT PARAMOUNT

individual is suitable, beyond a reasonable doubt, to

In MPS, Hewson says she has created a respectful

access and protect nationally sensitive information.”

environment where flexibility, family focus and support offered to staff are paramount, and key to its

When the Government decided to cull its providers

success.

of these services, Hewson says there were only three possible outcomes for MPS: win the next tender,

“I always wanted the respect we showed our staff

sub-contract to one of their competitors, or go out of

in the level of support we offered (and still offer) to

business.

create a stronger, adept and enthusiastic workforce who understand the importance of what we do and never lose passion for the daily work we all

WOMEN IN SECURITY MAGAZINE

23


undertake. I believe that is what makes MPS and

However, when your business and its competitors

myself stand out as a company.”

serve a single customer, those questions become particularly challenging.

She also acknowledges her debt to her mother and MPS’ other cofounder. “I had the privilege to learn

“My fear is based around having so many staff reliant

from them the values of the business, of leadership,

on us to provide a sustainable opportunity for them

and above all the importance of evolving and

and this is part of why I spend a lot of time with

championing change.

the board and team members and strategizing on projections, trends and capacity versus capability,

“I have been imbued with firm ethics, socially

to ensure I meet the magic sustainable number,”

conscious cultural beliefs and the importance of

Hewson says.

empowering our staff to continuously improve. They gave me a chance to expand my interest. They empowered me to find my own leadership style, and they trusted me with their company and their staff.” What they could not give her was something she sees as a great asset to the business: their partnership. “They grew and developed the company as a partnership, and it was nice to see that interaction and the benefits the two minds had by constantly bouncing off

“As one of the first outsourced companies to provide security vetting, MPS decided to introduce mandatory vetting officer training,” Hewson says. “By doing so, we knew it would give the protective security industry a level of respect and provide confidence for our client, the Federal Government, in the work we were undertaking. This training was later adopted by the whole industry.”

each other. I have had a similar opportunity and use both of them to bounce off, as well as others in my team, but it’s not quite the same. I

“It is challenging because I know my decisions have

would have liked to have had a ‘buddy CEO’ to grow

an impact on the industry, our one client, the Federal

with, laugh with and share the good and bad times

Government, the success of MPS as a security vetting

that are inherent in the roller coaster ride of running a

provider and of course, our most valued asset, our

business.”

employees. I am a strong believer in the importance of security vetting and its place as a frontline defence

RIDING THE BUSINESS ROLLERCOASTER

against threats to the security of both the Nation and

Many of those ups and downs would be familiar to

the Australian Government. This belief is evident in

any CEO. “What is the current demand? What about

every business decision I make.”

future demand? How will that impact our industry and

24

employees? How will I measure it effectively? How

DEFINING PROTECTIVE SECURITY

can I lead and communicate the change to ensure it

The services MPS provides fall within the, very broad

is smooth and effective? What new incentives can I

and ill-defined, category of ‘protective security’.

provide to ensure ongoing staff retention? These are

Hewson defines protective security as “the totality of

some of the daily challenges I embrace.”

all aspects of security protection for your business

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

assets/products, and ensuring operational plans

However, Hewson says there would be benefits in

are constantly imagined, managed and reassessed.

having a more widely accepted definition of protective

It is having your assets identified, identifying your

security, in particular to the Five Eyes partnership and

weaknesses/risks and having measures set in place

the new AUKUS alliance. “If we are working together

to mitigate and where possible eliminate those risks.”

towards a common goal, it makes sense to ensure our definition of protective security is one and the

She also likes the US Dept of Defense definition: “the

same. This would lead to the greater promotion of

organised system of defensive measures instituted

best practices in protective security.”

and maintained at all levels within an organisation with the aim of achieving and maintaining security,”

A REMARKABLE CAREER

saying this highlights individuals’ responsibilities.

Hewson has had a remarkable career: catapulted from the trainer — not usually a ‘preparation for

“This definition allows the general population to see

leadership’ role — to CEO, then fighting off multiple

not only the importance of having security measures

competitors when their common and only customer

in place, but also that all people, at each ‘point’ of the

reduced supplier numbers significantly.

protective measure, are responsible for the singular outcome, which is the protection of Information and

Her advice for other aspiring leaders matches that

Infrastructure.”

of many leaders who have shared their stories with Australian Women in Security Magazine: your team,

Hewson notes, in October 2018, the Attorney-General

and how you treat them are the keys to your success.

issued a new Protective Security Policy Framework.

“Surround yourself with experts in their own fields

She describes it as “a principles-based framework

and never be afraid to draw on the team. I believe the

designed to support a progressive protective

strength of a leader is based on the strength of the

security culture that understands and manages

team. Remember who stood before you and with you

risk, leading to robust security outcomes. There are

to get you to where you wanted to be.”

structured policies and guidelines which dictate our requirements to hold information at a variety of

www.linkedin.com/in/mpsrecruitment/

protective levels.” www.mpsolutions.com.au/

WOMEN IN SECURITY MAGAZINE

25


centre to help small businesses respond to cyber incidents such as ransomware, data breach and email payment invoice fraud. And it will have another purpose: it will train hundreds of students every year in cyber incident response. “It will help thousands of small businesses secure themselves and hopefully prevent bankruptcy and all

Dr Alana Maurushat Professor of Cybersecurity and Behaviour at Western Sydney University

of the emotional and physical harms that results from cyber attacks, which are never adequately discussed by the media,” Maurushat says. Her career in cyber got off to something of a false start. She was studying computer science as part of her undergraduate university course in the 1980s

D

learning Fortran and Cobol, but switched to media and communications, because she was one of only r Alana Maurushat is Professor of

two girls taking these subjects.

Cybersecurity and Behaviour at Western Sydney University where she holds a

She went on to gain a Masters and a PhD that were

joint position in the School of Computer

“highly interdisciplinary involving law, economics,

Science & Mathematics.

political science, security architecture, cybercrime investigations, information and communication

She is researching security activation, payment

technologies,” and then got into cybersecurity while

diversion fraud and ransomware, cryptocurrency

working at the University of Hong Kong, where her

tracing, cyber incident response optimization and

system was the target of many cyber attacks and

ethical hacking.

spyware.

Perhaps not surprisingly she says her biggest

“Throughout my university career I have always

challenge is a lack of time. “There is a paucity of

worked in advisory roles with industry and

senior cybersecurity people, who are spread very

government, and I’m still active in cybercrime

thin to train the next generation. We have a sufficient

investigations,” she says. “My first cybersecurity

supply of junior talent, an insufficient supply of

role was as a lecturer, and from there I played many

middle talent and an absolute scarcity of senior

different roles.”

talent. This curve will change over time as junior talent acquires more training, and middle people to

SPREADSHEETING DATA BREACH RULES

senior talent roles.”

Maurushat has worked on many research projects in cybersecurity and privacy but says her most

CAREER HIGH POINT

memorable — and one that brought her considerable

Despite her many and varied research interests she

kudos — was an Excel spreadsheet, to help

says her most meaningful research and the high point

organisations comply with newly-introduced data

of her career is something that seems more mundane

breach notification laws in 2004.

but extremely useful, for multiple reasons. It is the

26

Western Centre for Cybersecurity Aid and Community

“The laws were written in ways that were almost

Engagement (CACE), a new cyber incident response

impossible for someone working in the field to

centre at the University of Western Sydney. It is a call

understand,” she explains. “Different jurisdictions

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

were considering different models, and technology

“Trying to figure out what you are best suited to is a

companies have data and customers all over the

journey that never stops, no matter what you study or

world, which means it’s extremely difficult to handle

work at. You really only learn by trial and error, which

data and systems in a matter that is lawful under all

means your most important skill set is the ability

of the different legislation around the world.”

to make yourself do things you might not at first be comfortable with. It is only by doing that you really

“We broke down all of the different types of data that

see your potential.”

someone might have in their system and verified if that type of data was personal information, and

As to her own journey, Maurushat wishes she had

subject to data breach notification. We analysed

gained wider experience early in her career. “My

close to 32 different jurisdictions, 100 different types

cybersecurity journey has been interesting, but if

of data, and broke the notifications down so that a

there was one thing I could change I would have left

systems admin could comply with the law.”

law earlier to move into a more interdisciplinary role. I am now working with psychologists, criminologists,

That Excel spreadsheet has been downloaded tens

pen testers, forensics experts, economists and all of

of thousands of times. “It even got me a really good

the other areas that go into cybersecurity.”

keynote alongside the US President’s Head of Cyber,” Maurushat says.

And for anyone keen on pursuing a similar academic path, she says you need three attributes: a highly

RESEARCHING HUMAN FACTORS

interdisciplinary PhD, an obsessiveness to learn new

Her current research is focussed on the human

things, and a willingness to share.

factor in cybersecurity, what she calls ‘security activation’. “The specifics of how you move an

“I have the kind of passion that you only get by giving

individual or organisation from merely learning

your time and energy and sharing your skill set with

about cybersecurity to understanding its impact,

others.”

and empowering them to think they can implement appropriate changes.”

As for those who have influenced her careers and given to her, she names the late Professor Ian Kerr

While many organisations today devote considerable

formerly at the University of Ottawa, and Professor

resources to the human aspect of cybersecurity,

Graham Greenleaf, formerly at UNSW. “These two

Maurushat is not a big fan of these initiatives.

men were champions of women, always helped

“Awareness alone doesn’t work. Even phishing

others to nurture talent, and were two of the most

training doesn’t really work,” she says.

giving people I’ve known in my life.

Generally she believes the cybersecurity industry is overly focussed on the technical aspects, and this “is not an accurate reflection of the industry, its problems, and the skill sets required to deal with some of those problems.” Her advice for anyone in cybersecurity, or aspiring to join the industry, echoes that of many others who have shared their journeys with Australian Women in

www.linkedin.com/in/alana-maurushat-587116204/?ori ginalSubdomain=au alanacybersecurity.com/ www.westernsydney.edu.au/staff_profiles/WSU/ professor_alana_maurushat dymocks.com.au/book/ethical-hacking-by-alanamaurushat-9780776627939?fbclid=IwAR20dcyLz3Wr7l 8iDvDVjIuTwS0ZD004Yh6MjIQokfZiRCxBulnSJDj-HNc

Security Magazine: explore many possibilities, and do not be afraid to move out of your comfort zone.

WOMEN IN SECURITY MAGAZINE

27


The protective security industry was not her first career choice. “I decided to try out a security role before joining the Police. I’m approaching 15 years in the industry, so from ‘trying it out’ for a few years as a contractor to leading national risk and security operations, I think it’s fair to say I jumped in and never looked back.”

Emily Hunt National Risk and Security Operations Manager, Scentre Group

HER SCARIEST MOMENT Taking on her current role she sees it as being the scariest moment in her career. “This was a big jump in scale and scope — moving from leading executive and commercial security teams to leading the national risk and security operations across Scentre Group’s portfolio.

E

“Our centres see over 450 million customer visits a year and play an integral role in the community. mily Hunt is National Risk & Security

Knowing I would have a guiding role in keeping

Operations Manager with Scentre Group.

thousands safe every day was daunting.

Scentre Group owns and operates 42 Westfield Living Centres across Australia

“Our industry is essential to keeping people safe, but

and New Zealand.

often it’s only seen when things go wrong. We have a job to do to show the value of the security. Much of

The company was established in 2014 through

this is about changing its image: making our industry

the merger of Westfield Retail Trust and Westfield

a desirable profession to a wider group of people”

Group’s Australian and New Zealand management business.

Today, she says it is not security per se that is the most challenging, and rewarding, aspect of the role:

Hunt had worked for Westfield in security since

it’s the people aspects.

the early 2000s and moved across to Scentre Group when it was created, but her association

“The most rewarding point of my career has been

with Westfield goes back even further. Her first job

in my current role working with our teams and the

in security was with a private security contractor

broader community around mental health. This has

that specialises in handling dogs used for drug and

two parts: first how we equip our people to recognise

explosive detection.

and handle mental health-related challenges as part of their frontline roles. This included bespoke training,

28

“One of my first contracts was supporting Westfield

where the feedback we received from teams was

assets. This led to opportunities to work directly

amazing. The second is the work we have done in our

for Westfield and the executives in their Corporate

business that’s focused on our teams’ welfare and

Security division” she recalls.

psychological safety.”

“These were the years after the September 11 attacks

And Hunt says her role in risk identification and risk

and protective and physical security were front of

management is more about people management than

mind.”

security

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

CREATING A SECURITY CULTURE

protective security industry, to clearly communicate

“It’s about building a strong safety and security

its role and value.

culture as the foundation, leveraging the expertise of our team, building their capacity to identify risks and

“Much of our protective security framework is built, or

creating a space where they are empowered to call

informed by, government frameworks. The Australian

those risks out

Government publishes a strong framework around protective security. Although intended for Australian

“I don’t assume to be an expert in the specific security

Government entities, it has principles that any

risks of every asset we operate. It’s the teams at each asset that have the detailed knowledge. It’s my job to ensure they have the support, resources and tools to identify risks, and that the systems are there to elevate important areas to national attention.” The importance of a team focus, she says, is a lesson she learnt the hard way when her first child was born, and she struggled to maintain personal discipline and set boundaries between work and home. “If I could do it over, I would ensure I had the right balance.

“The most rewarding point of my career has been in my current role working with our teams and the broader community around mental health. This has two parts: first how we equip our people to recognise and handle mental health-related challenges as part of their frontline roles. This included bespoke training, where the feedback we received from teams was amazing. The second is the work we have done in our business that’s focused on our teams’ welfare and psychological safety.”

It highlighted to me the importance of spending more quality time skilling up your team. This includes carving out the time to have

organisation or security practitioner can understand

important career and development discussions.

and apply.

Prioritise these, don’t let those discussions slip, because you need to rely on your team and their

“In every industry, there will be a spectrum of

capability.”

performance when it comes to protective security and how organisations apply their security

PONDERING PROTECTIVE SECURITY

frameworks. This spectrum will range from thought

Despite its importance, protective security seems to

leaders to those in the early steps of their maturity

lack any clearly delineated industry. It’s hard to find

journey.

any certifications in ‘protective security’, or industry associations dedicated to it.

“There is consistency in certain areas of the industry, for example, standards and requirements around

Hunt says, in her experience, the term is not

emergency management, or Australia’s strategy for

commonly used outside the risk and security fields,

protecting crowded places. There is still work to

and there is a need to improve the visibility of the

be done, but these broader pieces of work and the

WOMEN IN SECURITY MAGAZINE

29


growth of public-private partnerships in protective

“You need to empower not only your security teams,

security are very encouraging.”

but every person in our organisation to practice security. It must become an instinctive part of

BEST PROTECTIVE PRACTICE

employee culture, so it becomes a natural practice

Hunt is clear on what implementing best practice

people fulfil as part of their day-to-day roles.”

protective security for an organisation requires. Hunt has come a long way in security since her first “It starts with a framework that captures security

job, intended only as an interlude on her planned

governance; policies that cover roles and

career journey. The two biggest influences on her

responsibilities, that set out how to plan, manage,

career, she says, have been Scentre Group’s Director

monitor and report, and that require activities to be

of Security, John Yates and Scentre Group consultant

rehearsed…Testing is critical to building resilience.

and Proton Security Owner, Adam Ickowicz.

Prevention is always preferred but testing plans so your teams know how to respond and recover

“John’s depth of experience and background in

from an incident is essential to being a responsible,

security is almost unmatched. He is a never-ending

sustainable organisation.

source of knowledge and advice when I need it. Importantly, I have learned about leadership from

“Central aims for me — beyond having the framework

him; his approach to people and how to create a

— are to have senior executive buy-in and support to

psychologically safe workplace.”

ensure the program is supported and accountable, and to use these to embed a culture of security.

Of Ickowicz she says: “Everyone needs someone who always has their back. Whenever I felt I couldn’t

“For me, ensuring a protective security program is

work through a challenge, he was there to help me

ultimately being focused on enabling my people. The

break down problems. Equally important, he has been

idea of ‘securing an organisation’ cannot solely be the

my biggest champion since I met him, consistently

responsibility of a security department. It’s a common

encouraging, reminding me I could do anything.”

mantra in my current organisation that ‘Security is everyone’s responsibility’, be it physical, cyber or personnel security.

30

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

unfounded. “What I did have was an appetite for learning, curiosity and a give-it-a-go attitude. It turns out that’s all you really need. STEM fields in general are more about your attitude and desire to learn. The cybersecurity industry is a relatively young industry compared to others, so everyone is still learning, everyone is trying to work it out as they go.” Her lack of cyber experience did not hold her back and in 2019, she won the ARN Women in ICT Rising Star Award. This, she says, gave her a platform

Emily Baker Regional Alliances Manager ANZ at CrowdStrike

from which to campaign for diversity. “Winning the award triggered an action plan and series of internal conversations about how we could be reaching, and appealing to, potential candidates who may not have previously considered such roles.”

CHAMPIONING DIVERSITY Despite all the progress made on diversity, Baker

A

believes more needs to be done. “At CrowdStrike, we are mindful of using more inclusive language in our bachelor’s degree in biochemistry and human physiology followed by a graduate certificate in nutrition hardly seem like suitable precursors for a career in cybersecurity, but they did not stop Emily

job descriptions for instance. This may seem like an easy fix, but many large enterprises still struggle with changing global descriptors. Workforce flexibility is also key in attracting younger people who are looking for a new challenge, but one that doesn’t conflict with

Baker, now Regional Alliances Manager at CrowdStrike.

their personal lives and commitments.”

However, she does acknowledge making the leap into

And it is not only on diversity where Baker sees the

cyber as one of the scariest moments in her career.

cybersecurity industry failing to communicate to

“I had so many doubts as to whether I would be able

potential recruits. “The industry as a whole needs to

to do my job. I had no cybersecurity background or

do a better job of promoting the cybersecurity field

traditional experience,” she recalls.

and breaking down the misconception that we are all working in programming or DevOps. There are so

“With a strong background in statistics and data analysis,

many different areas of cybersecurity to explore like

cybersecurity was still a leap after graduating, but I saw

partnerships, sales, marketing, communications and

there were some really interesting roles on offer. What

legal.”

nutrition and science were lacking in terms of pace of change, I discovered quickly in cybersecurity.”

A CYBER CAREER PROMOTER Having transitioned from nutrition into cybersecurity

Her first job was as an inside channel account manager.

herself, Baker is now keen to see other women

“I was fortunate to be in this role for only a couple of

make a career change. “I’d really encourage the

months before being promoted to account manager and

next generation of strong female talent to consider

then into a distribution account manager position,” Baker

this exciting field as a career. It is rewarding, both

recalls.

financially and intellectually,” she says.

TAKING THE PLUNGE INTO CYBER

“The industry moves at an incredible pace too and

Baker’s career-defining moment occurred in 2017

because of this, you will always be learning on the

when she joined a large cybersecurity vendor with

job. If you’re thinking about pursuing a career in

zero cyber experience. She says her fears were

cybersecurity but are uncertain, my advice is to just

WOMEN IN SECURITY MAGAZINE

31


give it a go. It might turn out to be the best decision you’ve ever made.” That certainly seems to have been the case for Baker, who says, “My cybersecurity journey has made me who I am today so I wouldn’t set about changing any of it.” To others contemplating a cybersecurity journey she offers this advice: “Never be afraid to ask questions, ask for help and learn from others around

“I would also reiterate the importance of persistence and perseverance. It doesn’t matter how many times you are told no, you can always keep trying until you get a yes, no matter how long that may take.”

you. Diversity of thought drives innovation and that couldn’t be truer than in the world of cybersecurity where knowledge sharing is key. “I would also reiterate the importance of persistence and perseverance. It doesn’t matter how many times you are told no, you can always keep trying until you get a yes, no matter how long that may take.” Of the many specialisations in cybersecurity, it is threat intelligence that piques Baker’s interest. “These individuals peek into the minds of adversaries, speak multiple languages, and try to understand and predict others’ motivations, tactics and techniques in order to stop attacks from happening. It seems to me a combination of psychology, technology and linguistics which is fascinating!” www.linkedin.com/in/emily-baker-0a304627/

www.crowdstrike.com.au/ www.crowdstrike.com/blog/five-questions-with-emilybaker/

32

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

is important for your business so you understand why your role is important and valued. Secondly, never talk in technical terms to the business or they will stop listening.”

MENTORED INTO SECURITY Bridget says mentors have played significant roles in her career, including being instrumental in her transition from mainframes into security.

Bridget Mitchell Executive Manager of Security Operations at nbn

“I won a high-performance award from the CIO after designing, developing and implementing a company directory on the mainframe in my spare time, which enabled staff across Australia and Asia to find and communicate with anyone in the company.

B

“It was the early 90s and very innovative at the time. ridget Mitchell, a finalist for the IT Security Champion award, is Executive Manager of Security Operations at nbn. She confesses to having worked in security for “a very long time”. Her career started with Ansett

Airlines, which ceased flying in 2002.

My mentor was leading the mainframe security team. He made security sound so exciting and asked me to join the team. I needed a new challenge, so I made the move.” Since then Bridget says she has had the good fortune to “connect with some incredible mentors who helped to grow my strengths and develop my weaknesses,”

Her initial role was looking after ‘network and

who were “instrumental in providing opportunities to

infrastructure’, known then simply as ‘voice and data’.

develop as a leader, enabling me to head up security

And she moved from there into mainframe security.

across a number of companies.”

While the technology she worked on might be long

SILO BREAKER

gone, Bridget says what she learnt about security is

Bridget’s award citation credits her with “breaking

just as relevant today.

down barriers between teams that remain siloed in many businesses.” To achieve this she first set up a

“I learned early the importance of security for a

monthly awareness session between the teams.

business, and why system security plays such a major role in managing risk when you are dealing

“It was like a ‘show and tell’,” she says. “This soon

with the people’s safety. The integrity of the systems,

grew to many other IT functions. This transparency

the accuracy and availability of information and the

not only informed teams about capabilities, it

confidentiality of information were critical just to

importantly generated a high degree of collaboration.

enable a plane to take off. This included weather

This has enabled a faster response for cyber defence.

information, data about the weight loading of the plane, the confidentiality of passenger manifests etc,

“We have a catch cry in security that ‘Security is

just to name a few.”

everyone’s responsibility’. However, we often then keep information about security to ourselves or only

And she adds, “My number one piece of advice,

share it with management. This makes it appear that

especially for technical people, is to understand what

security is a secret society and not transparent.

WOMEN IN SECURITY MAGAZINE

33


“An effective way to break down barriers is to

BEING A LISTENER

show metrics, particularly if they relate to business

“What I learnt from the beginning is that you need

objectives and KPIs. This can immediately show

to understand your company’s core business first

the business the value being delivered. Seek

and what is important. Talk to people, engage

understanding by listening to different points of view

everyone you come across, ask questions, and

and considering your past experiences. Don’t assume

LISTEN! Understand ‘why’ it is important to protect

that the audience is aware of the complexities and

the company’s core assets. The messaging must

challenges in trying to achieve an outcome.”

be provided from this business lens and in terms your business stakeholders understand, quantifying

The award criteria also describe a champion as

the risk wherever possible, otherwise, it is all just

someone who has mastered the art of engaging

blah, blah, blah. Listen when speaking with the IT

people with the IT security message. Bridget does not

engineers, this is still relevant because you are

believe she has yet achieved that but says listening

explaining why their role is important to the business.”

rather than being proactive is a major contributor to effective engagement. www.nbnco.com.au/

34

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

concerns with respect to their race, veteran status, sexual orientation, etc,” Thomas says. “It’s a very real, but not obvious, impediment to highly qualified people accepting stretch roles that could accelerate their career path and personal development.” Thomas identifies her transition from finance to

Wendy Thomas President and CEO of Secureworks

product management at Secureworks, after working on a strategic plan for the company, as an example of one such stretch role.

BEYOND HER COMFORT ZONE “Stepping out of my comfort zone in finance into an area where I lacked deep functional expertise forced me to leverage my unique strengths, while giving the

W

team an opportunity to be their best selves leveraging theirs. So, the shift out of the finance track was a endy Thomas is President and CEO of Atlanta-based Secureworks, a NASDAQ listed security company she joined in 2015 as Executive Director,

Finance. The company has been recognised by IDC and Gartner as a leader in managed security services.

great opportunity to learn from the team, to get creative, do things differently, and build something new together – which was incredibly rewarding in unexpected ways. Opportunities like that are a privilege that shouldn’t be dismissed out of fear of failure.” Regarding Secureworks evolving strategic direction, Thomas says: “It was clear the security industry

Thomas was appointed to her current role in

– and the underlying technologies responsible for

September 2021 after serving in a diverse set of

keeping secure – were evolving quickly. Our historic

roles across the company, including VP Finance, VP

approach of having great security experts work

Strategy, Chief Product Officer, and most recently,

across rapidly changing technologies and security

President of Customer Success.

products was not going to scale in the new future, and we were going to have to ‘data science the heck

So it’s perhaps no surprise she cites her “willingness

out of security’ – as one of our leaders at the time

to take on stretch roles where I might not be wildly,

often said.

perfectly successful” as a contributor to her success “We obtained the board’s support to invest in our However, this willingness once came with an

vision for changing the industry, and we made major

interesting reservation: a concern, especially later

changes to our team, technology and business

in her career, that her failure in a ‘stretch role’

model. Fast forward two years after launching a new

would make it harder for other women and ‘non-

platform and product portfolio, we hit $US100m in

traditional’ candidates to get a shot at a similar senior

annual recurring revenue.”

opportunity.

KEEPING THE TEAM INFORMED “That was an unfair burden to accept, and I often

One important lesson Thomas learnt from this

talk about that now with mentees who have similar

process was: “you cannot over-communicate with

WOMEN IN SECURITY MAGAZINE

35


your team, particularly during times of evolution and

including SolarWinds, Hafnium, and ongoing activity

growth. … While the team has delivered amazing

from Russian, Chinese, Iranian and North Korean

outcomes, looking back, I know I could have done a

threat actors persisting throughout 2021, for most

better job communicating and celebrating more often,

organisations ransomware, rather than cyber

in more ways, all along the journey.

espionage, remains by far the biggest cyber threat.

“Not only do teammates need to hear from leadership

“The ransomware-as-a-service affiliate model has

multiple times, consistently, about any initiative or

lowered the barrier to entry and helped ransomware

area of significant change, they need to hear it all

groups rapidly scale their activities. Fortunately,

along the journey. Sometimes, leaders hesitate to

mitigating against ransomware attacks with good

communicate at all when there are many unknowns,

security basics stands you in good stead against

but not communicating until you have ‘all the answers’

cyberespionage attacks too.

is a sure-fire way to send a message that people should assume the worst. Rather, leaders have to

“Threat actors of all kinds like the easy life. They

communicate what they do know, be open about what

aren’t going to burn complicated zero-day attacks on

they’re still working to answer, and demonstrate a

victims that still haven’t patched vulnerabilities dating

commitment to transparency throughout – even when

back five years. So our message is, get the basics

it’s uncomfortable.”

right. Patch promptly, according to your risk profile. Implement multifactor authentication. Lockdown

So, it’s perhaps no surprise when asked to describe

internet-facing systems and remote working

her role, Thomas says, “My number one focus as

solutions. And monitor. The faster you detect a threat

President and CEO is to support my Secureworks

actor on your system, the better your chances of

teammates in the realisation of our purpose, to secure

preventing the attack from escalating.”

human progress, and to set our strategy for achieving that purpose.”

MAKING THE CASE FOR CYBER LITERACY She also advocates for broader technology and

Rather than pick one decision or event as the most

security literacy across society at large to enable

significant in shaping her cybersecurity career, she

people to take better preventive care of their digital

flags her ongoing interaction with customers.

lives and thereby make cybercrime less rewarding and less damaging.

CUSTOMER INTERACTION TOP PRIORITY “Understanding their purpose, their ways of

Her view is informed by her, somewhat unusual,

working, seeing first-hand the people and assets

experience as a teenager. “Before I could drive the

we’re responsible for securing — it’s irreplaceable.

family car, my dad made me learn about how the car

That understanding makes us a better partner to

worked and how to do basic repairs — change a tyre,

our customers, inspires our team, and fuels the

check the belts for wear and tear, check oil and fluid

improvements we make to our technology to solve

levels. Despite a good bit of eye-rolling at the time,

our customers’ evolving security challenges.

what he taught me ensured I took better care of my future cars, and more importantly gave me confidence

“And, as someone who enjoys learning something

in dealing with sudden car trouble.

from everyone I meet, I’m grateful for the inspiring ideas I often pick up around how to build a better

“Our lives are so dominated by technology and digital

business or become a better leader. The best journey

information that, as global citizens, we should all

is one that doesn’t end.”

understand more about how the technology we use works for us, and sometimes against us.”

In Secureworks’ experience, she says, despite the high profile of nation-state sponsored cyber attacks,

36

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

“Stepping out of my comfort zone in finance into an area where I lacked deep functional expertise forced me to leverage my unique strengths, while giving the team an opportunity to be their best selves leveraging theirs. So, the shift out of the finance track was a great opportunity to learn from the team, to get creative, do things differently, and build something new together – which was incredibly rewarding in unexpected ways. Opportunities like that are a privilege that shouldn’t be dismissed out of fear of failure.”

Mentoring has loomed large in the career of almost

and ultimately can positively influence your career

every woman profiled in Australian Women in Security,

success.”

and Thomas says, “having someone challenge your thinking and encourage you to be your best self is a

Thomas says she has both benefited from being

powerful way to grow.”

mentored by “some amazing people” and helped others to become amazing leaders in their own right.

Her advice is to “seek out mentors proactively, with intentionality around what you’re looking to address.

“To quote from the show, Ted Lasso, [a TV show

Because the kind of mentorship you need changes

about a fictional, small-time American football coach

over the course of your life and career, seek out

who is hired to coach a professional soccer club

mentors proactively, with intentionality around what

in England, despite having no experience coaching

you’re looking to address.

soccer] ‘A good mentor hopes you’ll move on, a great mentor knows you will.’”

“Keep in mind that a great mentor is also seeking knowledge, so be equally thoughtful about what

“To have had the opportunity to not only work with

you bring to the relationship as you are about what

those amazing individuals but also to do meaningful

you hope to gain. While it may be intimidating, I

work in a field that does so much good, have

encourage you to seek real feedback from your

been deeply important to me. My teammates at

mentors. Go into each conversation with an

Secureworks are collectively helping to make the

open mind. Making people who care about you

world a safer place, providing the kind of effective

comfortable enough to share their observations and

security that enables businesses, schools, hospitals

feedback will help you be more aware of how you’re

and so many others to fulfil their mission. I couldn’t

perceived and enable you to grow beyond measure.”

ask for a more satisfying career than that.”

SPEAKING OF SPONSORS And Thomas offers another piece of valuable advice:

www.linkedin.com/company/secureworks/

don’t confuse mentors with sponsors. “Mentors are important for learning and new perspectives, but careers rarely progress without a strong sponsor inside your organisation. Sponsors are the seniorlevel people within the organisation who advocate for you, promote your work, champion your projects,

twitter.com/secureworks www.facebook.com/secureworks

www.secureworks.com/

WOMEN IN SECURITY MAGAZINE

37


Melbourne Network, a local affiliate of the non profit Customer Experience Professionals Association, founded in 2011. Since then she has been instrumental in the creation of another non-profit organisation, the Australian affiliate of Women in CyberSecurity (WiCyS), in 2020, and in 2021 was a founding member of the World

Anita Siassios Managing Director at ManagingCX

Experience Organization. Its mission is “to connect, serve, inspire, and provoke the pioneers of the experience economy.” She says the inspiration for WiCyS came from “a mentorship, established via the Financial Executive

A

Women’s Organisation which at that time was led by the inspiring Judith Beck, author of ‘No Sex at Work”. nita Siassios is the managing director of ManagingCX, an organisation she founded in 2018, describing the move as “the greatest achievement in my career.” ManagingCX offers training, coaching

Beck had started a membership organisation, Financial Executive Women, in 2012 and Anita was providing mentoring services under its mentorship program. “I was privileged to be assigned to a mentee,

and certification in customer experience skills. Anita

a successful IT executive passionate about

describes it as “a company whose purpose is to

cybersecurity, who was seeking to build their global

empower individuals with holistic skills and career

network. So the first thing I recommended was to

guidance to succeed in the customer experience

join an association and to network with likeminded

management discipline and profession.”

individuals,” she recounts.

It was the first CX training organisation in Australia

“I started my research to find the right global

to offer the Customer Experience Professionals

association and finally came across Women in

Association (CXPA) authorised training program

CyberSecurity inspired by the founder Dr Ambereen

across Australia, and came into being when Anita

Siraj, who’s hypothesis for establishing WiCyS was ‘If

took a parenting break from corporate life.

women saw more like them, then more of them would follow’. Having established the CXPA Melbourne

“I very quickly had to wear the hat of a marketer,

Network, I knew exactly what it would entail: passion

business development, finance, legal and HR

to serve others, and lots of voluntary time!”

manager,” she says. “This experience was personally

38

transformational, taking me out of my comfort zone,

Anita’s first job was supportingbanking mainframe

accelerating my professional and business skills in

systems in 1989 and she progressed to managing

a way that could not have been achieved in such a

the implementation of large hardware and banking

short period if I had remained in my corporate role.”

systems across the globe.

FOUNDER OF MULTIPLE ORGANISATIONS Anita might rank the creation of ManagingCX has

CYBERSECURITY INTEREST PIQUED BY A BREACH

her greatest career achievement, but it was not her

Her interest in cybersecurity was sparked when she

first such initiative. In 2016 she founded the CXPA

was tasked with leading the establishment of a global

WOMEN IN SECURITY MAGAZINE


W H AT ’ S

H E R

J O U R N E Y ?

privacy office for a major bank in Australia that was

“READ SHAREHOLDER REPORTS”

striving to adapt to changing regulatory and privacy

She has some useful, and perhaps non-intuitive,

regulations. However cybersecurity became a passion

advice for cybersecurity professionals aspiring to

only when the bank suffered a major privacy breach

leadership positions: read shareholder reports as a

that impacted thousands of customers.

means of learning to think strategically and learning the executive language. “Some of the most inspiring

“Despite the disappointment of such an event, the

shareholder reports I have read are Jeff Bezos last

learning and understanding on how important the

shareholder letter in 2020 and Warren Buffet’s letters

cybersecurity industry is profoundly impacted my

since 1965,” she reveals.

drive to make a difference through the mission of WiCyS Australia,” she says. She’s taken on the role of

“Reading shareholder reports helped me refine my

vice president for 2022.

language and presentations to executives. I have found this to be the most successful and fundamental

Her interest in customer experience comes from

discipline, and I incorporate it into my coaching and

much earlier in her life: growing up in the 70s in a

training of CX professionals.”

family that ran a small business. She learnt “how important customers were for a business to survive.”

Anita lists several factors that she believes have contributed to her career success: believing in

But it only really took hold of her life in 2012: “very

yourself, building trusted and positive relationships;

early one Monday morning following a long technical

bringing out the best in others.

implementation weekend that had gone horribly wrong impacting thousands of customers and their

And the one piece of advice she did not follow: don’t

businesses.” That experience led directly to her

stay in a role for more than two or three years. “I was

founding CXPA Melbourne.

in one of Australia’s largest banks for close to 30 years. Yes I climbed my way up and expanded my

Asked how she would describe the role of

experience by pushing myself and learning by taking

‘customer experience professional’ to a young

on roles in various departments but what it didn’t

person contemplating a choice of career, she says

allow me was to expand my business network. … If

the defining characteristic is someone who acts

there’s anything I’d like the reader to take away from

as a catalyst, who benefits their organisation by

this interview is the importance of networking.”

“understanding, designing, and improving experiences across the entire customer relationship.” And she offers a list of key activities the CX professional

www.linkedin.com/ in/anitasiassios/

should undertake. www.managingcx.com/

1. Drive a culture of customer-centricity where every aspect of the corporate culture – from the top down is focused on the customer. 2. Inspire and unite every department and employee in the quest for customer experience excellence. 3. Ensure every customer experience gain contributes to positive business performance outcomes. 4. Focus on customer needs and engagement where every thought and action is meaningful, making customers’ lives better and showing you care.

WOMEN IN SECURITY MAGAZINE

39


Rebecca Moonen

operating table while being anaesthetised. “Before

Security and Privacy Influence and Cyber Safety Outreach Manager at nbn

with you about your work,” Beck recalls. “Never one to

F

miss an opportunity, I started to preach about scams. The doctors said I continued to chatter on about scammer tactics well beyond a reasonable timeframe

inalist in the Best Volunteer category

for the anaesthetic to have taken effect... proof that

Rebecca Moonen’s day job is Security

I’ll take any chance I can get to help spread the word!”

and Privacy Influence and Cyber Safety

VOLUNTEERING OVERSEAS

Outreach Manager at nbn. As part of that role, Beck’s had the

opportunity to work with Port Adelaide Football Club’s Aboriginal Programs Coordinator, Jasmine Miller to create a cyber safety module for students in remote indigenous schools. Alongside nbn’s CSO Darren Kane, and with the support from manager Kate Monckton, Beck joined the Port Adelaide Football Club’s ‘WillPOWER’ team on the road to assist in delivering the module to six remote schools in the Barkly Region of the Northern Territory. The project reached 500 students across 27 remote communities in the Anangu Pitjantjatjara Yankunytjatjara (APY) and Maralinga Lands of South Australia and the NT and, says Beck, “kicked off my love of making sure every Australian knew how to access the nbn™ network safely.” Since then, after dealing with yet another scam campaign exploiting the nbn brand, Beck decided to drive awareness about the increasing frequency and risk of scammers impersonating nbn, and to help educate the community on how to identify scammers so they could take action to protect themselves.

COUNTERING SCAMS Partnering with multiple teams within nbn, Beck developed a scam awareness and education campaign for nbn and worked with the team at the ACCC’s Scamwatch to create presentation packs and deliver these to the community at a grass-roots level to reach some of the most vulnerable people in the

Combating scams is far from being Beck’s only volunteer role. “I’m an enthusiastic supporter of Kiva microloans, supporting 22 countries in sectors like education, health and housing,” she says. “I’m a passionate fundraiser for the Tabitha Foundation in Cambodia, and the Tumaini Children’s Home in Tanzania, both locations where I’ve travelled on volunteering missions and kept in contact with the communities I’ve visited.” Beck has also been a wish granter for the Starlight Foundation. Beck has enjoyed support in her volunteering activities through nbn’s Corporate Social Responsibility program. “It provides opportunities for our people to go beyond their day jobs to help create positive social, environmental and economic impact,” she says. “The company provides paid volunteer leave each year, and our flexible working policy means engaging with communities through volunteering doesn’t have to be squashed into any particular timeslot outside of business hours.” Her direct manager, Anthony Cohen, has received award recognition for his volunteering. He has been named a finalist for NSW’s Local Hero in the 2022 Australian of the Year Awards for his charity Project Displaced, a free support service to help those who lost their job because of COVID-19. “I couldn’t do what I do without the support of Ant and the Security Influence team, and Ant couldn’t do his amazing work without his manager having his back also,” Beck says.

community, with help from the Council of the Aged

“The leadership team in the Security Group really

(COTA) and the Australian Seniors Computer Clubs

live by nbn’s ‘we care’ value - and their support and

Association (ASCCA). “It was a labour of love that

encouragement for the team extends beyond what

often filled up my nights and weekends,” she says.

we do from nine to five.”

Her passion for raising scam awareness is impressive, even extending to preaching from the

40

the anaesthetist does their job they make chit-chat

WOMEN IN SECURITY MAGAZINE

www.linkedin.com/in/rebeccamoonen/


Security Pathways Program Providing technical hands-on workshops, specialised training, certifications, mentoring and career advice Applications for Cohort 4 NOW OPEN Sponsored by Learn more at www.awsn.org.au/initiatives/securitypathways-program/


In retrospect, Peck says she would have chosen a different path into the industry. She gained no new skills from her TAFE course, describing it as “giving a very simplistic overview of both relevant and irrelevant topics,” but she did acquire a new supportive network in her cohort.

Kelly Peck Associate Consultant | GRC at Cyber CX

“Instead of TAFE, I would use that time to study industry recognised qualifications like Network+ and Security+. I would also combine this with attending networking events, listening to podcasts, and learning from the multitude of free resources that can be

K

found on the internet.” elly Peck has degrees in Russian,

And she adds: “From networking with hiring

German, and linguistics and a list of

managers and recruiters, I have come to understand

volunteering activities as long as your

that doing the qualification was not a necessity.” She

arm. They include animal welfare,

has now embarked on what she expects will be a long

disaster relief, mentoring, poverty

program gaining relevant qualifications: CISM, and

alleviation, and youth work. She has volunteered in

because of her GRC role, studies in ISO27001, and

Australia, the Philippines, and Germany.

NIST.

Despite this background, she was struggling to find

Despite the well-publicised shortage of cyber security

work. During this time, she found her way to cyber

professionals, Peck believes entry level jobs are rare.

security, “I started networking with people who work

However, she was lucky and applied for three, got

in the cyber security space and knew straight away

three interviews and two job offers.

that this was the right path for me.” So she embarked on a Certificate IV in Cyber Security

THE IMPORTANCE OF COMMUNITY ENGAGEMENT

from TAFE Queensland, started applying for cyber

“The three companies I applied for were very different

security jobs while studying, and is now an associate

from each other. However, I noticed all three found

consultant in governance, risk, and compliance (GRC)

it important that I showed a lot of passion for the

with CyberCX.

industry. Additionally, they wanted me to show the ways in which I am active in the community, through

Having decided to pursue a career in cyber security,

networking events, memberships, and listening to

Peck says the biggest decision was whether to go for

podcasts, etc.”

a technical or non-technical role. She believed she would have more opportunities if she chose technical

Peck’s cyber security career has got off to a good

but was interested in GRC.

start and her experience provides useful guidance for others contemplating a similar path, but perhaps the

COMMUNICATIONS SKILLS AND EMPATHY

most important lesson is the value of a good mentor.

“I thoroughly believe my experience in linguistics and procurement helps me in my role as a GRC associate

“I reached out to a friend who is a security analyst

consultant,” she says. “It allows me to have a deeper

and she gladly became my mentor,” Peck says. “In

understanding of what a client wants, whether that

return, I offered her lessons in linguistics. I benefited

comes from body language, the words they speak, or

greatly from her guidance - she helped me make

written communication. It is important to have good

connections in the field, advised on my career

communication skills and empathy for the client’s

pathway, and ultimately led me to the position I am in

situation.”

now.” www.linkedin.com/in/peckkelly

42

WOMEN IN SECURITY MAGAZINE


CAREER PERSPECTIVES


ANU KUKAR

AKIRA SINGH

HOW TO JOIN AND CONTRIBUTE

to the cyber space from a nontraditional cyber background by Akira Singh, Associate Cyber Security Consultant at IBM A/NZ and Anu Kukar, Associate Partner, Cyber Security Strategy, Risk & Compliance at IBM A/NZ

Given cyber criminals are constantly thinking of

background in either field. After finishing my degree I

new ways to attack organisations, shouldn’t we be

worked in a legal technology start-up as a consultant.

thinking differently by bringing in people with diverse backgrounds to help respond to attacks and protect

There I learnt about legal services, the ways in which

organisations?

they are delivered, and how they have changed

Here are stories of people entering the cyber world

drastically in the past few years. Legal, and other

from completely different professions:

important services such as accounting, banking

• A law graduate joining and starting her career as a cyber graduate.

and education are beginning to innovate in how they interact with clients, leveraging the rapidly changing

• An accountant and risk professional with 20+

online environment. I developed a particular interest

years of experience transitioning into cyber.

in how these changes would impact businesses and their users, especially in relation to security.

AKIRA Starting my career in law

Moving to cyber

Six years ago, when I first made the decision to study

I jumped at the opportunity to apply for a graduate

law, I would never have guessed I would be working in

program as a cybersecurity consultant, not knowing

cybersecurity today.

the value my legal background would have in the role. Almost four months into the program my perspective

44

I never considered cyber or technology as a

on cybersecurity has changed completely. I have

viable route for me because I had no educational

not only learnt a great deal about the technology

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

and cyber space, but I have also been able to apply

will enhance your capabilities, build your network,

my legal knowledge in various aspects of my role:

and provide you with invaluable experiences.

everything from client meetings and proposals to

There are always people to guide and support

social eminence opportunities.

your growth.

Three things I wish I knew earlier in my career

In the short time I’ve been in the cyber industry I’ve

1. The cyber space needs individuals and

been able to participate in market eminence activities

perspectives from different industries and

by speaking in a webinar as a cybersecurity expert on

fields, not just technology. There are many

the SOCI Amendment Bill, working on a point of view

different areas within cyber that value a wide

submission on cyber resilience, and co-authoring a

range of backgrounds, such as law, psychology,

publication.

intelligence, social studies, and more. 2. Education does not stop after your degree. With

I have had the pleasure of working in a supportive,

advancing technologies and an emerging threat

female-led team, and I can see the legal perspective

landscape, upskilling and further education are

I bring to my role is greatly valued. I can also see the

ongoing requirements. Staying relevant is a major

direct impact my work is having on our clients and the

factor for success, and is greatly valued within

cyber world as a whole as we continue to bring new

the cyber industry.

ideas and insights to the table.

3. It is a mistake to shy away from tasks and opportunities that are outside your comfort zone or repertoire. Saying yes to as much as possible

WOMEN IN SECURITY MAGAZINE

45


ANU

Stage 3: Make the transition into cyber?

Career advice to anyone with experience wanting to

There were three things I did, and I would advise

move into cyber.

anyone wanting to upskill/transition into cyber to do

An accountant and risk professional with 20+ years’

the same.

experience transitioning into cyber.

1. Self-study and upskill – take online selflearning, courses and certifications focused on

I call it the ‘C to C’ in 20 years

understanding NIST frameworks, cybersecurity

Chartered accountant to cyber professional. I started

end-to-end and how-to-do work activities.

my career as a tax accountant and upskilled myself

2. Join associations – by joining security

continuously to learn, grow and stay relevant. That

associations such as ISACA, AISA and AWSN

has seen me transition into roles such as internal

you will have access to the latest jobs, thought

auditing, strategy, risk, compliance, governance,

leadership, webinars and to conferences where

regulation, third-party risk, risk innovation, data and

you can network and meet others in the cyber

technology risk.

profession. 3. Social eminence – share your views and ideas

It has been tough to continuously learn and upskill,

for the cyber profession. Start building your voice

but very rewarding because it gave me an opportunity

and contributing whilst also creating your brand

to try different roles. So, if after five, 10 or 15+ years

in the cyber profession.

of working you have decided you want to be a cyber professional, and are wondering how to do that, my

CONCLUSION

three key stages of advice would be:

As you have probably gathered by now, cyber is a profession that needs, and greatly values, the

Stage 1: Be clear on your purpose

perspectives, ideas and experiences of individuals

Be clear and ask yourself why you want to be a cyber

from various fields of work. It can be an incredibly

professional.

rewarding career, especially if you are interested in contributing to the security of Australia.

For me, it was about making a difference, and being drawn to the purpose of cybersecurity – protecting

Whether you have just finished school and are

and securing critical infrastructure for Australia. I had

deciding on your degree or have years of experience

a reason and purpose. It is this clear purpose that

and are ready for a career change, consider joining

helps you when the going gets tough.

the cyber community.

Stage 2: Understand what you can contribute

If you have any questions about taking the leap and

Reflect on your career experience to date, talk to

joining a cybersecurity team, feel free to reach out to

others, and learn how you can contribute.

either of us.

I saw I could contribute my accounting, risk and

Anu Kukar

compliance, and third-party risk experiences to the cybersecurity industry, and provide support for things

www.linkedin.com/in/anukukar

such as: costings and business cases Akira Singh

• Cyber strategy and cyber program development • Cyber risk posture measurement and management • Cyber governance and reporting • Compliance and regulations for cybersecurity • Cyber third-party management.

46

WOMEN IN SECURITY MAGAZINE

www.linkedin.com/in/akira-singh/


CHELSEY COSTELLO

TOP 10 RECRUITMENT CHALLENGES TO TACKLE IN 2022 by Chelsey Costello, Principal Information Security Recruitment Consultant at Talenza

The last two years we have seen our industry change

the industry, the positive news is that strides are

dramatically. Many agency recruiters took internal

been made to move the needle. In the period July

jobs amid fears the market would not recover.

2020 – June 2021, unconscious bias training was the third most registered course on LinkedIn Learning,

Earlier this year we saw the cybersecurity job market

according to the most recent Talent Trends Report

pick up in a big way, and there is now a shortage of

from LinkedIn.

people in agencies to fill job. The market shifts have been interesting to watch. Now, as the nation opens

Several interventions can be made at each step of the

up, it’s very much a wait and see situation. However,

recruitment process to attract more female talent into

it would be naive of the private sector to fail to

security roles. These range from using gender neutral

anticipate market needs for the coming year. Below I

language in job ads to making sure there is balanced

share some insights into where we are now and what

gender representation across the business and the

we have to tackle in 2022.

hiring process. So put these on your priority list for 2022, if you have not done so already.

1. GENDER DIVERSITY IN SECURITY Diversity, equity and inclusion is a big topic but when

2. UNICORNS AREN’T REAL

it comes to hiring cyber skills, we are seeing a lack of

Recruiters are often given a long list of job criteria

female representation across the board. According to

regarded as essential by the employer, but most of the

McAfee, the Australian cybersecurity industry is still

time the successful candidate meets only 50 percent

sitting at 25 percent female. Unconscious bias can

of these. At times we are seeing the terms ‘CISO’ and

creep into recruitment, a challenge we will continue

‘security administration’ in the same job description.

to face in 2022. While I do note this as a threat to

This is a recipe for burnout for anyone hired into such

WOMEN IN SECURITY MAGAZINE

47


a role, and providing an exhaustive list of essential

enterprises have had to hire GRC professionals to

specific skills and experience is detrimental to the

comply with new regulations. Things like the Cyber

chances of attracting great talent. When writing an

Operational Resilience Intelligence-led Exercises

advert companies should focus on what they really

(CORIE) Framework have led to more demand for

need.

red teamers. As companies continue to digitise the cybersecurity industry must evolve, creating more

For example, do you really need 10+ years’ experience

vacancies across the board.

in your advertised role or could you hire on potential? Do you really need a degree and certifications, or

5. LACK OF JUNIOR OPPORTUNITIES

would industry experience suffice? And do you really

In June 2021 we undertook some market research

need Splunk, or could your candidate have worked

to understand the fastest-growing roles. It became

with a similar SIEM solution?

apparent there is real demand for senior level roles, and few junior roles being advertised. Most graduate

It’s the job of recruiters to really educate clients on

and entry level programs were halted during COVID.

industry best practice. We aren’t unicorn hunters.

As the needs of businesses become more complex

Our role is more about providing education and

and more specialist skills are needed, people who

consultation.

have held junior and mid-level roles over the past two years are stepping up. Unless the graduate uptake

3. SKILLS SHORTAGE

increases significantly, the impact of this will be felt

There is still a skills shortage across the industry,

in years to come.

particularly at senior levels. Whilst the skills pipeline take time to close the gap at senior levels. There

6. ACCELERATION OF SALARIES AND CAREERS

are several companies creating development

We have seen a significant increase in salaries,

opportunities in government areas where they will

particularly for junior and mid-level candidates. To

also reap the benefits of tax incentives. Accenture is

address skills gaps, junior security professionals are

one example. It is working with the SA Government to

being quickly promoted into senior roles, sometimes

set up Advanced Technology Centres of Excellence in

doubling their salaries. I can recall several candidates

Adelaide with a focus on defence and cybersecurity.

who have been offered

Programs like this will also partner with local

a salary of $120k after

universities to create more entry level jobs and

a year or two in an

develop talent to address the skills shortages.

entry-level role paying

has grown rapidly over the last few years, it will

$60/70k. Similarly, companies like CyberCX, NCC Group, Deloitte, PwC, EY, Safer Internet Project and Merimetso, to name a few, have developed excellent graduate and associate training programs to address the skills gap. If you are looking to break into the industry, I would recommend keeping an eye on these companies.

4. GROWING WORKFORCE DEMAND According to AustCyber, 7000 additional security jobs will be added to the Australian workforce by 2024. At present, there are more jobs being advertised than there are active candidates, and many positions remain vacant. Small to medium

48

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

7. MIGRATION

time to be a candidate, because salaries are higher

Typically, Australia has had the luxury of handpicking

than previously. However, these higher salaries often

great talent from overseas. The laid-back lifestyle and thriving economy make Australia an incredibly desirable place to make a new start. The borders have now been closed for almost two years and skilled migrant visas have been in steady decline since 2015 from around 128,550 to 79,620 visas approved in 2020. It will be interesting to see how these numbers track over the next 12 months as borders begin to re-open. Pre-COVID many of our clients were happy to consider visa sponsorship, but most are too apprehensive now to try, putting further pressure on limited candidate pools.

come with expectations of elevated performance levels. In a market with limited candidates, where candidates are in the driving seat, employers must work harder to ‘sell’ the benefits of working in their organisation. Candidates hold all the aces, and in some ways are choosing employers based on their experience in the interview processes.

10. ELUSIVE CANDIDATES Cybersecurity candidates generally do not want to be found. Many choose not to share details of their employer or their role, because doing so could

8. LOCATION AGNOSTIC ROLES

create risk for their company. This makes it hard

The rise of remote working has opened up the talent

for recruiters to find suitable candidates. Those

pool dramatically. Not too long ago, a company hiring

candidates that can be found are being approached

security professionals on the Sunshine Coast would

multiple times a day by recruiters and companies

have been limited to that area. Now, it can tap into

alike. Therefore, capturing their attention is harder

talent across the country. This has had two effects.

than ever. At Talenza we use our existing database,

Salaries have been driven up to be almost the same

networks and referrals in addition to headhunting to

across the country, and many companies now have

attract the best in the industry.

access to a nationwide talent pool. This has created more opportunity for workers in Queensland in

The cybersecurity industry is not slowing down

particular, and there is more competition for highly

anytime soon

skilled candidates. With global tech companies like Google

Times are tough for companies not listening to

and Facebook, and leading security

candidates, but those adapting to the times are

companies like CrowdStrike and

outperforming those that are not. As specialist

FireEye hiring 100 percent remote

recruiters in cybersecurity we make it easier for our

talent and offering competitive

customers to navigate the space by providing advice

remuneration packages, Australian businesses are finding it hard to compete.

and guidance on market trends. Through our sector expertise and our extensive networks we are able to have 85 percent of our CVs turn to interviews and then placements. We place strong emphasis on

9.CANDIDATE DRIVEN MARKET In a candidate-led market

diversity, equity and inclusion in our interview process, and I am proud that 44 percent of my placements this year were female. If you would like to chat

like today’s we are seeing

confidentially about recruitment, or you are looking

candidates receiving

for a new job, please reach out to me on chelsey@

multiple offers and often

talenza.com.au.

counter-offers to stay in their current role. There

www.linkedin.com/in/chelseycostello

has never been a better www.talenza.com.au

WOMEN IN SECURITY MAGAZINE

49


KELLY RAZLOG

DIVERSITY AND INCLUSION by Kelly Razlog, Head of Emerging Technology | InfoSec | Cyber Security

Here at Randstad, we pride ourselves on diversity and

people may not understand the effects of inclusion

inclusion in the workplace.

and its importance. Just as an organisation should conduct security awareness training to protect its

Research has shown having a broad and equal

employees and the business as a whole, it should do

representation of genders in your business can make

the same for gender inclusion.

your business more innovative, financially successful and attractive to talented job seekers.

INVOLVE BOTH GENDERS IN THE INTERVIEW PROCESS

As such, if you’re looking to build a strong employer

By having both genders in the interview process

brand and assemble a workforce that will drive

from the get-go an organisation can minimise the

your organisation to new levels of profitability

risk of the panel being biased. Obviously, you should

and success, diversity and inclusion should be an

be hiring based on skills and not gender, but there

absolute priority.

are still employers where unconscious bias may be present. By starting with a diverse hiring team

Today, I want to touch on five ways to ensure your

and moving towards a more structured interview

recruitment process is gender-neutral and talk you

approach you can help ensure this bias does not

through our human-forward approach to recruitment.

undermine the process.

So, how do you ensure your recruitment process is

WORK OFF SELECTION CRITERIA DURING THE INTERVIEW

inclusive?

Using selection criteria you are able to focus more on

50

PROVIDE ORGANISATIONAL TRAINING AROUND INCLUSION AND DIVERSITY

skills, identifying where each candidate’s strengths

This is an important aspect of any organisation.

If you use this as a guide, the best candidates soon

Awareness and training are key, because some

stand out.

WOMEN IN SECURITY MAGAZINE

and weaknesses are based on their technical abilities.


C A R E E R

P E R S P E C T I V E S

DEVELOP A DATA-DRIVEN APPROACH

be, and there is now a much greater focus on ‘woman

By relying on data you can develop consistent and

in tech’ that has been great to see. This year alone

actionable initiatives that lead to real, long-term

we have seen a spike in the number of females being

sustainable change. An effective inclusion program,

hired, and many more companies are making this a

integrated with diversity goals and a company’s

preference to bring diversity into their teams.

corporate values, can produce higher retention, greater productivity, stronger Net Promoter Scores

By integrating these five measures into the recruiting

and more. Part of this data collection process is an

process, organisations increase the likelihood of

integrated effort to identify the relevant insights that

attracting the very best talent available, which in turn

need to be considered.

helps them retain staff and increase profits. Doing so will ensure you create the kind of inclusive, dynamic

REMEMBER THE HUMAN-FORWARD APPROACH

workplaces of the future that I believe we would all agree are exactly where everyone wants to work.

At the end of the day, it’s important to remember you are placing people - not just filling jobs. Gender-based

www.linkedin.com/in/kellyraz/

hiring is definitely not as serious an issue as it used to

WOMEN IN SECURITY MAGAZINE

51


MEGHAN JACQUOT

#IChooseToChallenge THERE IS NOT ONE PATH TO ENTER CYBERSECURITY by Meghan Jacquot, Associate Cybersecurity Threat Intelligence Analyst, Recorded Future You need to do this…

technology classes. In fact, I was teaching English.

You need to study that…

Then I moved to a small school in Silicon Valley. I was

You have to get these certifications or this degree…

able to combine my joy of teaching, learning, science

No, emphatically no! There is no one path into this

and technology, and start teaching these topics.

industry and there is no one way that is the “right” way.

I always evaluated my situation. Am I doing what I want to be doing? In 2017, I started taking a closer

I was a teacher before I pivoted and became a threat

look at bringing technology into the classes I was

intelligence analyst. During my studies for my first

teaching. I was already doing IT technician work for

degree I never took a programming class. I never

my school, so it was a natural progression. I started

coded. I liked to understand how things worked and

programming more and thought about teaching a

help people. So I studied history, secondary education

computer science class.

(teaching teenagers), and teaching English language learners.

In 2018, my father unexpectedly passed away. He was a database analyst and programmer. As a kid, I

52

I struggled to decide at the age of 17 what exactly

was always encouraged to think critically, be curious,

I wanted to do when I grew up. At first I thought

and not follow every single rule. He shared his love

I wanted to be a veterinarian. I worked in animal

of technology with me. I know he would love to hear

hospitals and enjoyed my science classes. However,

what I’m up to today.

taking a genetics class as a first year university

As I continued to evaluate my options over the years

student helped me realise it was not what I wanted.

I kept taking classes, learning and sharing what I

I changed. I still enjoyed science, but for the first

learned in formal and informal ways. As a teacher,

few years as a teacher I did not teach any science or

I created introductory and advanced engineering

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

I was a teacher before I pivoted and became a threat intelligence analyst. During my studies for my first degree I never took a programming class. I never coded. I liked to understand how things worked and help people. So I studied history, secondary education (teaching teenagers), and teaching English language learners. classes, an advanced computer science class, and

Cybersecurity and WiCyS, to help break down barriers

a maker lab. I worked on python and c++ coding.

to entry. Anyone who wants to enter this industry

I decided to enrol in a formal learning program. I

should be able to do so. Sometimes gates are placed

went back to school for a second bachelor’s degree

across the paths into cybersecurity, but there is no

in cybersecurity with a focus on network systems. I

one path to enter the field and there is no single set of

graduated in August 2021.

skills essential for success.

I started an internship in risk assessment with the

Formal education may not be for you, or it may

Cybersecurity Future Foundation in March 2021. I

be exactly what you need to excel. Whatever your

stopped formal teaching in June 2021 and started in

preferences, there is a path into security for you.

cyber threat intelligence as an analyst with Recorded Future in September 2021.

You may love to program, or you may hate it. You may have a love/hate relationship with it. You may even

What was my path? It meandered. I evaluated and

fear it. There is still a path into security for you.

iterated what I wanted to do. I knew I enjoyed, and learned more from, formal learning experiences,

Certifications may give you structure and a goal

whether those experiences were conferences or

to work towards or could be necessary for certain

studying for a degree. But I knew I needed more

government positions. Or certifications could be

structure.

completely unnecessary for your role. There is still a path into security for you.

As early as 2015 or 2016, I knew I wanted to shift to a field within technology. Then I narrowed that field to

You may start in cybersecurity as your first career, or

cybersecurity. Our industry is broad. As a technology

pivot as I did. You may be in cybersecurity and change

lover and, initially, an industry outsider, it was at first

your role. Evaluate and iterate along the way.

overwhelming to determine what I wanted to do within cybersecurity. I started broad and, over time,

The better you know yourself and your preferences,

narrowed to a few areas of interest in cybersecurity.

the easier it will be to find your path. As you learn other people’s stories you will see there has been no

A lot of my narrowing happened through involvement

one path and there is no one set of skills, degrees,

with cybersecurity organisations. At the start of my

or certifications needed for success. Explore your

information security journey, I would ask people I had

path, take note of its meanders, and appreciate its

recently networked with what had been their path

particular idiosyncrasies - no one else will have the

into security. One thing all those conversations had in

exact same path.

common was the variety of routes people had taken into security.

www.linkedin.com/in/meghan-jacquot-carpe-diem/

Breaking down barriers in security also means breaking down the gates the gatekeepers put up. I

twitter.com/CarpeDiemT3ch

work with two different groups, Breaking Barriers in

WOMEN IN SECURITY MAGAZINE

53


RACHEL MAYNE

FIVE WAYS TO ENSURE YOUR RECRUITMENT PROCESS IS GENDER NEUTRAL by Rachel Mayne, Senior Associate, Cyber Security at u&u Recruitment Partners Over the years we have seen a big drive to improve

A job description is often the first impression (aside

diversity in the workplace as research continues

from word of mouth – I’ll get onto this later) a

to reveal the benefits of a diverse, multicultural

candidate will get of the company’s culture. Words

workforce. Gender equality has been a big focus and

such as ‘competitive’ and ‘dominant’ tends to paint a

often the starting point for gender diversity is the

picture of a male-dominated environment.

recruitment process. They can often turn off women who may have Companies are offering higher salaries, altering their

otherwise considered the role, whereas words such

hiring processes, and asking the question “how can

as ‘collaborative’ and ‘cooperative’ suggest a more

we attract women to join our business?” So, what

supportive culture, gender neutrality, and less of a

more can be done?

‘Wolf of Wall Street’ type company.

When my clients ask my advice on how to get a more

Using a mix of language, or replacing/removing

diverse pool of candidates applying for their roles,

certain words, is a quick and simple change

I always refer to a few points research has shown

companies looking to attract a wider pool of

make a significant difference.

candidates can make.

These include:

Luckily, women are feeling increasingly confident, sufficiently so to apply for roles looking for a ‘strong

1. WORDING IN THE JOB DESCRIPTION

leader’. It could be that we have reached a turning

Studies have shown certain language to be more

point and will not need to avoid such language in the

gender neutral and more appealing to female job

future. It will become not only acceptable, but normal

seekers.

54

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

for women to apply for roles advertised in such

important. The cybersecurity community is quite

language.

small. A company’s reputation for how it treats and values women will be a massive factor when female

2. REVIEWING OF CVS

candidates decide whether to apply for a role.

One of the best ways to prevent unconscious bias is to eliminate any data/information that refers to

Progress starts from the top. You cannot fix a

personal attributes of the candidate.

diversity problem simply by adding more women to the team: you need to make the workplace a female-

This means removing from resumes name, gender,

friendly environment.

country of origin, and anything that specifies more than the experience, skills and qualifications of the

5. MORE THAN JUST THE JOB ITSELF

candidate. This will help minimise bias and result in a

Throughout the hiring process, it’s important to

more objective candidate selection decision.

promote the benefits of joining the company in addition to the benefits of the advertised role.

3. HIRING PROCESS Ultimately, it’s impossible to completely remove

Things such as flexible work arrangements, return

our unconscious bias, so a business should focus

to work programmes and partnerships (such as

on equipping its employees with processes (as

with charities who support women getting back into

mentioned above), training and tools that reduce bias

the workforce) show a deeper investment in gender

as much as possible.

equality than a tick in the diversity box.

There’s a lot of material to help train hiring managers on how to acknowledge their biases. This heightened

IS UNCONSCIOUS BIAS STILL PRESENT WHEN RECRUITING WOMEN?

awareness will contribute to eliminating bias in the

It is difficult to eradicate unconscious bias throughout

hiring process.

a business, so there will probably always be a degree of bias against minority groups in the workforce.

Additionally, a more structured interview process with set questions and technical tests, where appropriate,

The market is taking large steps to reduce

will also help to identify the candidate whose skills

unconscious bias, although there is still some way to

and experience alone make them the best fit for a

go. One benefit of the recent lockdowns is that the

role, rather than their gender or perceived cultural fit.

stereotype of the woman looking for work/life balance is disappearing. Everyone is demanding a better

Finally, when conducting an interview, think about who

balance. Hopefully unconscious biases will dimmish

is present and how that will look to the candidate. If

as a result.

there is a panel or an interview process dominated by middle-aged Anglo-Saxon males, it will not shout

It is important to realise that a company cannot

‘diverse culture’ to a female applicant.

achieve gender diversity overnight. It requires a shift in culture, a willingness to make changes, and

4. INTERNAL CULTURE CHECK

numerous steps to be taken. Once organisations

There is no easy way to change internal culture, and

acknowledge the challenges we have a much better

the process can be very confronting. Simply deciding

chance of creating cultures that welcome all genders,

to be a more diverse company and hiring more

ethnicities and minority groups.

women will not change the intrinsic culture. www.linkedin.com/in/rachael-mayne/

These days, most candidates will check Glassdoor and company reviews and ask friends before applying

www.uandu.com/team/rachael-mayne

for a role. This is where word of mouth is really

WOMEN IN SECURITY MAGAZINE

55


ASMITA GOVIND

HOW TO WIN IN THE WAR FOR TALENT by Asmita Govind, Account Manager for Technology Recruitment at Sirius Technology

Over the last few weeks, I have had many

IT professionals are exposed to multiple news articles

conversations with clients and candidates about the

about how hiring is on the rise, about the shortage in

‘Great Resignation’ and the ‘Demand for Talent’. The

tech talent, etc.

pandemic has definitely changed and challenged the way we all work, and many of our responses have

They receive recurring calls and LinkedIn Inmail

been reactive.

messages from recruiters. All these communications make it harder for anyone to remain happy in their

A new challenge in the war for talent is coming. Are

current role. Curiosity will eventually make them say

you ready for it?

“I’m not really looking, but I am happy to hear what you have open.”

Pre-pandemic it was tough to find talent for certain technology specialisations. There were never

Over the last 12 months, I have found staff retention

sufficient candidates with the right skills for the

and talent attraction the toughest challenges

number of positions to be filled.

organisations have had to deal with. I am sorry to say, it is only going to get worse.

Companies were able to attract top talent by offering:

• More money

What can you do as a leader to help minimise the

• Benefits like the option to work remotely

number of staff leaving your team in an environment

• A great team culture

where it is already very hard to find talent? Here are

• Training and progression plans

some suggestions.

• Sponsorships for overseas candidates

However, over the last year with all the restrictions

ENSURE EACH MEMBER OF YOUR TEAM HAS A TRAINING/PROGRESSION PLAN ALIGNED TO THEM

that have been imposed, many of these tactics have

The pandemic has changed business priorities as

become redundant.

well as personal priorities. It is natural these priorities

• Days off for birthdays • Wellness programs

56

WOMEN IN SECURITY MAGAZINE


C A R E E R

P E R S P E C T I V E S

include what people want for their futures and their

or free financial advice/health insurance etc. It is

careers. Whether your company has sidelined training

easy for these to be forgotten when they are not

and growth plans to focus on keeping the doors open,

immediately needed.

or has put staff reviews on hold, it is worth having a conversation to discuss the relevance of these

INTRODUCE TEAM BUILDING ACTIVITIES

initiatives in the current climate.

This one can sound like something for the too-hard basket, or a bad idea because no one wants to spend

Your team needs to feel you are investing in their

more time with co-workers. However, team activities

growth and development. The best way to do this is

help create connections between team members and

to have a scheduled meeting specifically to discuss

these help build loyalty.

these issues. Is there a goal you can help them meet? Is there some mentoring required? Is there some

These do not need to be big-budget productions. Even

training that can be booked?

something as simple as Friday lunch out of the office or even something as simple as a virtual trivia game

HAVE THAT UNCOMFORTABLE CONVERSATION ABOUT SALARY

can be fun.

People find it difficult to ask for a pay rise. Most will

Is your company cancelling its Christmas function

go to all the effort of updating their resumé, applying

this year because of pandemic rules? Is there an

for roles, preparing for interviews and getting a

alternative you can look to, such as a New Year party?

job offer before admitting they just wanted to feel

Many people feel they have been cheated out of these

appreciated with a pay rise. For some reason, many

events, and that is having an adverse impact on team

technology companies do not seem to have a practice

spirit.

of conducting regular salary reviews.

PROMOTE INTERNALLY WHEN POSSIBLE If a pay rise is something that cannot be offered,

Companies that promote internally have the best

or the team member needs to hit some more goals

stories to tell. Internal promotion signals to team

to get one, it is good to work on those issues early,

members that their employer believes in them and is

rather than having a rushed conversation when

willing to invest in them. Someone who is promoted

someone hands in their resignation. At this point, they

will always be more engaged than someone who

have already decided to move on. If they do stay, they

has chosen the role over other offers. It also helps

will usually move on in less than six months after

with retention as there is a career path with your

being persuaded to remain.

organisation.

RECONSIDER WHAT FLEXIBLE WORK MEANS?

EMPLOYEE RECOGNITION

These days remote working, or working from home,

Sixty percent of the workforce want and enjoy

is just expected. The question is no longer “Can I

recognition for the work they do every day, that is

occasionally work from home?” It is “What hours

more than half your team.

are now core hours?” People like the office and the

96 percent of the workforce actually do better in their

interaction with their teams, but they also like going to

roles when they are recognised, whether they want

the gym, or picking up their kids after school. It’s now

recognition or not. A happier and more productive

more about what hours of the day are required.

team leads to higher retention and is attractive to new hires.

REMIND YOUR TEAM REGULARLY ABOUT COMPANY BENEFITS

Before you say “That all costs money we don’t have”

Many companies offer attractive employee benefits,

some of the best recognition initiatives are achieved

for example, access to novated leases for a car,

with little cost. Personally, some of my favourites

WOMEN IN SECURITY MAGAZINE

57


from my previous managers have been: • An instant scratchy (part of a running joke of winning big) • A handwritten thank-you note

interview process for potential hires a good one. We are all busy, but a strong recruitment process can tell a candidate a lot about a company. It will give them a taste of what is to come when they join.

• Celebratory hot chocolate for hitting personal milestones • A genuine LinkedIn post appreciating the work the team had done to deliver a project

In a market where candidates have multiple job opportunities, you need to sell your company and the roles on offer as best you can. Money will be a driver,

• A special mention at a team meeting

but we are all emotional beings: most of us will also

• An early finish for a job well done

consider how we felt during the process.

• An additional day off Have a clear job description that shows the candidate There are probably many more ideas. The key is to

you know what you need.

start implementing them but more importantly doing

Know your company benefits and why people want

so regularly.

to join. Ensure feedback is provided in a timely manner after

Sometimes you can do everything right, but people

the interview.

will still move on. It is a fact of life. But there is one

Ensure the next steps are known to everyone

thing I know: the world is a very small place. So,

attending.

when people do choose to leave, remember it is not

Remove any steps that are not adding value to the

personal, and you will cross paths again.

process. Be able to explain clearly what progression for this

And that leads on to: what things can we do now to

role would look like.

attract top talent to our teams and organisations? Traditionally skills gaps were filled by experienced

BE OPEN TO OPTIONS THAT WILL ALLOW YOU TO WIDEN THE TALENT POOL

migrants and by international students who looked to

A job description usually has a list of everything an

secure work after graduation. However, with borders

ideal candidate will have. But the best candidate may

closed and people wanting to be closer to family, this

be the one missing some of those requirements.

has stopped. We will not know the longer-term effects

They have something to grow into, something to

of this for a while.

learn and something to challenge them. Understand clearly what attributes you can do without initially,

The best we can to find the right people for our teams

and possibly support the person to get, and those you

from the pool of people available.

really must-have.

DO YOUR RESEARCH

As an example, you may require experience with a

Speak to people in your network who may be hiring

particular tool, can you consider someone who has

similar roles, connect with recruiters and ask them

used a similar tool and have your team help get this

what salaries look like today, and what talent is

person skilled up on the tool you use?

available. Over the last few months, salaries and daily rates have changed considerably.

REVISIT YOUR COMPANY BENEFITS Working from home is no longer seen as a benefit.

58

REFINE AND TAILOR YOUR RECRUITMENT PROCESS

Post pandemic. The questions are now: can you be

Change is coming and coming fast. Partner with

changes to the times’ meetings are held to allow

your HR and internal recruitment teams to make the

people to start and finish early?

WOMEN IN SECURITY MAGAZINE

flexible with hours? Is there an option to make some


C A R E E R

P E R S P E C T I V E S

shared coffee, tea, fruit etc. See where that money

CONSIDER BUILDING TALENT RATHER THAN BUYING

can now be spent: lunch vouchers, compensated

Have you considered looking at students or people

messages, etc all go a long way.

who need sponsorship? So many companies eschew

With a large remote workforce, you will be saving on

these options because people can take time to get up

BRAND YOURSELF, AND YOUR COMPANY ON LINKEDIN AND OTHER PLATFORMS

to speed. However, depending on the role, graduates

Before meeting anyone new, or attending an interview,

of diversity to the team. Their experiences can add to

most of us will do a quick LinkedIn stalk. Use this free

your team in ways you might not expect.

and people on sponsorships can bring a different kind

tool to help you attract great staff. I am not talking only about writing a post that says you are looking for

Alternatively, you can consider people in other job

staff – although that is highly recommended.

types with transferable skills that may make them suitable candidates. For example, a business Project

Post things about your team, relevant things about

Manager who has gained a Cybersecurity certificate

the company that could excite people. Even things like

could be a potential candidate if you are looking for a

volunteer work, or events you attend, will help people

Project Manager for a Cybersecurity project.

connect to you as a manager.

HAVE A GOOD REFERRAL PROGRAM A candidate will be choosing to work with you just

Many times I have had clients refer candidates to me

as much as they are choosing to work with your

for a role within their own company, purely because

company, so sharing your professional personality will

they do not have an internal referral process and

help top talent connect with you.

the application will get lost. Internal candidates are usually an excellent cultural fit. Who does not like to

PARTNER WITH YOUR TALENT TEAM AND EXTERNAL AGENCIES

work with their friends?

Have you ever walked into an electronics shop and

The next few months are going to be tough for

come across a salesperson who does not know the

leaders in technology. People management will

product they are selling? You are very likely to walk

demand a greater focus. I hope you are up for the

out without buying something, even though you have

challenge.

done all the research yourself at home. When you come across a salesperson who owns

www.linkedin.com/in/asmitagovind/

or uses the product you are interested in, you will likely leave with that product, and also a bunch of accessories you did not know you needed.

twitter.com/asmitagovind instagram.com/asmita.govind

Your recruitment agency or internal talent team is that salesperson. Take the time to help them understand the role, benefits and where you can and cannot be flexible. Tell them about the wider team and strategy so they can convey this information to potential candidates.

WOMEN IN SECURITY MAGAZINE

59


SKYE WU

TAKE A CHANCE TO FIND OUT THE MOST SUITABLE NEW TALENT by Skye Wu, Cyber Security Investigator, Speaker, Mentor & Champion for Diversity

“I feel like I’m stuck in a loop. I need experience to

Candidates with lots of potential are not offered roles

apply for entry level jobs after I graduate, but how can

because they lack role-specific experience.

I get experience if no one will give me a chance?” Sometimes I also hear the argument that it is unwise “It’s so difficult to find a suitable candidate to fill our

to recruit people who will require training, because

roles.”

they will move on once trained. I can understand that point of view: there is always a risk someone will

The experience of someone wanting to join the

leave. For some high-pressure teams the resources

security industry and the experience of recruiters can

available to help train and develop new team

appear like twin train tracks: running alongside one

members may also be scarce.

another but never intersecting. In addition, certain roles may require a very specific Having been both a student wanting to get my start

set of skills.

in the industry and a person recruiting suitable candidates for job roles, the solution has always

However, I want to share what happens when a

been clear to me: recruit talent based on aptitude,

beginner keen to develop the hands-on skills not

motivation and potential, and help them grow.

taught in books and the classroom is given a chance to join a team of specialists in a high-pressure team.

But when I talk to the people doing the recruiting, I often find myself on the losing end of the argument.

60

WOMEN IN SECURITY MAGAZINE

What if I told you that, many years ago, a detective


C A R E E R

P E R S P E C T I V E S

senior sergeant took a chance and hired for the

When I recruit today, I focus on the spirit in which I

computer crime squad a young woman (me) straight

was offered my first opportunity. I know technical

out of university with no hands-on experience

aptitude is important. If a person possesses the core

in digital forensics? I got lucky. It was a highly

skills, we can teach them the day-to-day tasks. If we

specialised role where the outcome of my work

fail to recognise and act on this knowledge, we may

had significant legal ramifications for people: their

miss out on a great asset to our team, or, worse, drive

freedom or their incarceration.

someone from our industry.

On my first day on the job the detective senior

The same spirit drives me to work with Australian

sergeant said to me: “I want you to know, I hired

Women in Security Network (AWSN) in my spare time.

you because you impressed me with how you

AWSN supports women in the industry as well as

communicate and how you think. You can articulate

those wanting to join. In their ranks are some of the

and explain yourself so well. This is what I want. You

brightest minds I have encountered. Many would be a

will learn the hands-on skills required to be a digital

great asset to any team.

forensic analyst.” What followed was a whirlwind of observing and learning from some of the best minds

My only request is, when you next recruit for your

around.

team, particularly at the entry level, please think about how you word your job description, how you

Not long into the role, I was showing investigators

state the role requirements and how you prepare

compiling evidence to present in court, writing

your interviewers. Give yourself the chance to find the

statements and stepping up to testify in the witness

most suitable new talent.

box in the Supreme Court. (Silently reminding myself “don’t trip on the steps”). I realised I was living up to the detective senior sergeant’s expectations when, after giving my testimony, a judge thanked me for helping him understand complicated electronic

www.linkedin.com/in/skye-wu-ba390919/ www.skyewu.com/

evidence, and victims thanked me for my work.

WOMEN IN SECURITY MAGAZINE

61


NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

Tracking apps for tweens’/teens’ devices The debate rages over whether you should or should

leaked. The privacy safeguards in some apps are

not track your tween’s/teen’s location via their phone.

not very strong.

Some parents feel this to be spying and wish to instill trust in their teens whilst others prefer the peace of

• You could raise trust issues with your tween/ teen.

mind that comes from being able to pinpoint their tween’s/teen’s location at any time of the day.

HOW CAN YOU TRACK YOUR TWEEN’S/TEEN’S LOCATION VIA THEIR DEVICE?

Which view is right?

Apple Family Sharing – Location Sharing. A family ‘organiser’ will set up location sharing in the Family

I don’t know. All I know is, as parents, we all make

Sharing app’s settings. Then family members can

what we think is the right decision for our kids at any

choose to share their location. You can lock location

particular point in time.

services (under the privacy settings) so your child cannot toggle location services on and off when it

WHAT ARE SOME OF THE REASONS YOU MIGHT CONSIDER TRACKING YOUR TWEEN’S/ TEEN’S LOCATION USING THEIR DEVICE? • You may need to know your tween/teen has

suits them. To turn on location sharing in Family Sharing, do the following:

arrived at school safely after walking or taking

1. Settings > [your name] >

public transport.

2. Tap Family Sharing > location sharing.

• You won’t be home from work after school, so it’s good to know your teen has arrived home. • Your tween/teen has sports or hobbies at school or on the weekend. • Your tween/teen has a hectic social life, and you

device to view their location on a map. You can set up frequently visited places, like home, school, sports, etc, so you can see their location at a glance. This

feel much more relaxed when you can actually

feature is only available if you have a Microsoft 365

see where they are.

subscription. It works for iOS and Android. However,

• Knowing your tween’s/teen’s location could alert you to them meeting an online predator. • If you have a teen who drives, some apps will allow you to track the speed at which they are driving.

WHAT ARE SOME OF THE REASONS YOU SHOULD NOT KEEP TRACK OF YOUR TWEEN’S/ TEEN’S LOCATION? • Some companies have profit in mind and NOT your child’s safety. They are more interested in collecting your child’s data to sell to third parties. • Your tween’s/teen’s data is at risk of being

62

Microsoft Family Safety app — Use your teen’s

WOMEN IN SECURITY MAGAZINE

you may not have access to all features on all device types and operating systems.


C O L U M N

Family Link app — Family Link by Google allows you to turn on location for your teen’s device from within the settings. This feature is turned off by default so you will have to toggle it on if you wish to use it. Location will only work if your teen’s device is turned on and signed in (with their child account). It will not work if the battery in the device is flat. Family Link works best on Android devices. Life360 — This is a very popular location sharing app that many families use. They can see where family members are on a private map and receive alerts when family members arrive or leave school and work. It has a private chat where you can share photos and text messages. You can view location history, receive information about driving safety, and track phones. Life360 can be downloaded on both Apple and Android devices. You can take out a paid subscription for more features. www.linkedin.com/in/nicolle-embra-804259122/ www.thetechmum.com www.facebook.com/TheTechMum

www.pinterest.com.au/thetechmum www.linkedin.com/company/the-cyber-safety-tech-mum/

WOMEN IN SECURITY MAGAZINE

63


INDUSTRY PERSPECTIVES


KAREN STEPHENS Karen is CEO and co-founder of BCyber, an agile, innovative group who works with SMEs to protect and grow their business, by demystifying the technical and helping them to identify and address cybersecurity and governance risk gaps. Karen has recently graduated from both the TechReady Woman Accelerator graduate and CLP program with the Cyber Leadership Institute in 2021.

C O L U M N

Financial services to cyber…. A journey has begun After over 20 years in big financial services corporations I made the move into cybersecurity. You’re probably thinking “Why?” or “Are you stark raving crazy?” or “Maybe I can do it too.” The answer to the first question is “Why not?” Business skills are transferable, and a (relatively) new and definitely exciting industry beckoned. The jury is still out on question two, and the answer to the final question is “Yes, yes, you can.” You just have to want to do it. With the exponential connectivity growth brought about by COVID and the rise of data breaches, it does not take a genius to work out there is a need for cybersecurity professionals. But cybersecurity is a broad church embracing very technical people (e.g. engineers) and the non-technical. All have the potential to make a positive contribution. I am just getting started, but I have learnt a few things on my journey so far. No two days are the same. Every day you will learn something new - so you need to be comfortable with change. Read like your life depends on it. I read anything and everything cyber-related, from white papers to technical briefings. Nothing is safe from my prying eyes. Education is queen. Self-education is important, and while it would be great to go back to university or do another postgraduate course, sometimes it is just not possible. Learning through microcourses is one way you can build your knowledge quickly and meet a great cohort of new people (I’ve just completed the AWSN Security Pathways Program and can highly recommend it). Technical terms do not always translate between industries. After accepting an invitation to an asset management meeting and expecting a fund manager but getting a CISO (sad, but true), I have made it a

personal mission to ensure I translate cyber into the language of business. Your experience is transferable. Build on what you already know. In my previous work I specialised in SME risk management, compliance and business growth. Cybersecurity is vital across all these areas, and yet is often overlooked. Reality versus expectations. Many people believe cybersecurity is all about hunting down threat actors and searching the Deep and Dark Web on The Onion Router, just like in the movies. For some, perhaps, but for the majority of us cybersecurity is about working with clients to harden their cyber resilience programs, putting in place workable frameworks and well-practiced incident response plans to deal with the inevitable breach. It takes a village. My move into cybersecurity was made easier by finding a mentor and joining like-minded groups (another shoutout to the AWSN). To date everyone I have met has been very generous with their time and knowledge. The hard part is asking for help. So, if you’re given the chance to join the amazing and fast-moving world of cybersecurity, jump in with both feet. After all, is it not better to give something a red hot go rather than to die wondering?

www.linkedin.com/in/karen-stephens-bcyber/ www.bcyber.com.au karen@bcyber.com.au twitter.com/bcyber2 youtube.bcyber.com.au/2mux

WOMEN IN SECURITY MAGAZINE

65



SAI HONIG

WHY DO I FEEL LIKE A FRAUD?

Imposter syndrome and cybersecurity — why they go hand in hand by Sai Honig, CISSP, CCSP, Co-founder New Zealand Network for Women in Security

It can happen anywhere. It may happen during

their status, position or others’ positive perceptions.

conversations around the office. It may happen when receiving an award (such as the Australian Women

For a long time, imposter syndrome was not taken

in Security Awards). It may happen when going on

seriously. It was classified as simple anxiety, self-

errands. It is a sense of complete unworthiness.

loathing or self-doubt. But much research has been conducted on this topic.

It comes on suddenly. The mind may go blank. In extreme situations, breathing becomes laboured

There are five types of imposter syndrome. Briefly,

or the heart rate increases. You may even start

they are:

clenching your fists tightly. The need to flee may

• Perfectionist – The focus is on “how” something

arise. These are some of the sympathetic nervous

is done. The perfectionist focuses on the

system responses to — IMPOSTER SYNDROME.

minor flaws without focusing on the overall accomplishment.

Imposter syndrome was first described by psychologists Pauline Rose Clance and Suzanne Ament Imes to “designate an internal experience of

• Expert – The focus is on “how much” is known or done. The expert sees minor lack of knowledge of a topic as weakness.

intellectual phoniness”.

• Soloist – The focus is on “who” does something.

Imposter syndrome is the term used when a person,

• Natural Genius – The focus is on “when”

The soloist sees needing help as a weakness. despite their objective successes, has persistent self-

accomplishment happens. The natural genius

doubt. There is anxiety about being exposed as an

focusses on competence measured in terms of

“imposter”. The prevalent belief is “unworthiness” of

ease and speed.

WOMEN IN SECURITY MAGAZINE

67


• Superwoman/Superman – The focus is on “how

Some may have a fear of loss of income, employment

many” roles can be excelled in. The superwoman

or specific relationships: losses that can have

or man sees falling short in any role as a

devastating consequences. However, their capabilities

weakness.

are never acknowledged.

In all cases, weakness is associated with shame: the

Cybersecurity, by its very dynamic nature, encourages

person believes there is something fundamentally

cases of impostor syndrome.

wrong with them. • Career paths in cybersecurity are unclear or Imposter syndrome is more prevalent among women,

uncertain. There are no defined entry points

and there is a higher rate among women of colour

or measures of expertise. Most come into

than among white women to develop this mindset.

cybersecurity from related fields like IT. Career changers or those with completely unrelated

For those who cannot understand why someone with

backgrounds are encouraged to join the ranks of

accomplishments would react with self-loathing,

cybersecurity professionals. Success is difficult

consider this: how did you feel when someone

to define, and benchmarks difficult to establish,

pointed out your shortcomings? Did you feel small

adding to the uncertainty

or vulnerable? There are social conditions that make some more susceptible to imposter syndrome than others.

• There is ambiguity, and environments are dynamic Cybersecurity professionals are continually trying to identify and eliminate

Reactions to the fear of “not being good enough”

vulnerabilities and block attack vectors. It

can vary. An individual with imposter syndrome may

is difficult to feel a sense of mastery when

shy away from volunteering for projects that could

scrambling to deal with new threats. What may

showcase or increase their capabilities. They don’t

be known today may be obsolete tomorrow, next

want to draw attention to themselves.

week, next month or next year.

They may fear failure. These individuals may not

• The skills required are evolving constantly. After

apply for other roles and stay sequestered in the

spending time learning new skills cybersecurity

same position. By doing work they are familiar with

professionals are faced with situations that

and have done before, there is no chance of failure.

demand learning more skills. After several years

However, there may also be no chance for growth.

into a cybersecurity career, they may feel they are starting over repeatedly. Having to grapple

68

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

with their newly acquired advanced skills that become outdated in just a few years can leave a person constantly feeling like a beginner. Enjoyment in accomplishments can be shortlived.

P E R S P E C T I V E S

happens. • Acknowledging what imposter syndrome does to your body. • Acknowledging what imposter syndrome does to your mental state. • Acknowledging what you can do to overcome

• The breadth of knowledge required is huge.

the effects.

Cybersecurity Body of Knowledge has indicated there are 19 “Knowledge Areas”, not

There is no single remedy for imposter syndrome.

including the different technologies that fall

Talking about it with understanding and accepting

under each of them. It would be difficult to

colleagues often helps. You might find others in your

have mastery of multiple areas, let alone all of

professional circles having the same thoughts.

them. Acknowledging a lack of mastery isn’t a confidence booster.

For some, consulting with mental health professionals is necessary. There should be no

• There is a high failure rate. Attackers only have

shame in reaching out when you need help.

to get it right once. As defenders, we have to be right 100 percent of the time and are called

Sometimes writing about it can reduce the anxiety

out when we fail even once. The best defences

one feels. Writing this article certainly helped me.

will fail. Cybersecurity professionals need to

Whatever you need to do, do it.

acknowledge their failures without losing their sense of accomplishment and self-worth.

The world needs cybersecurity professionals. We

On top of all this, there are not enough of us. We are

cannot let our anxieties prevent us from keeping our

often working longer and harder just to keep up. It

world safe – online and off.

can feel overwhelming at times. It is easy to see how imposter syndrome can creep in. Ultimately, self-acknowledgement is the key to overcoming imposter syndrome.

www.linkedin.com/in/saihonig/

NZNWS www.newzealandnetworkforwomeninsecurity.wordpress.com

• Acknowledging that imposter syndrome

WOMEN IN SECURITY MAGAZINE

69


JESSICA ROBERTS

INSPIRING GIRLS by Jessica Roberts, Social Media and Content Creator volunteer, Inspiring Girls Australia

You might have seen the hashtag #ThisLittleGirlIsMe

their feeds with positive content. So, we thought a

popping up all over social media as women

great way to help girls find their passion would be to

around the world share stories of their careers and

connect them to female role models on social media.

personal journeys. This social media campaign for

By tapping into these inspiring women they can see

‘International Day of the Girl’ was started by the

what could be, be empowered to reach for the stars,

global charity, Inspiring Girls.

and realise their potential.

Inspiring Girls is on a mission to break down gender stereotypes so young girls can reach their full

HOW DID YOU PROMOTE IT? WHAT REACH HAS IT ACHIEVED?

potential and have the confidence to follow their

We reached out to as many inspiring women as we

dreams. The charity connects young girls with female

could, asking them to share their stories with the

role models through school workshops, inspiring the

young girls of today. The response was extremely

girls to aim high and believe anything is possible.

positive, with women embracing the campaign and calling on others to take part. We had some incredible

Jessie Li, Chair of Inspiring Girls Australia, tells

women join in, including Melinda Gates, Billie Jean

Australian Women in Security Magazine how Inspiring

King, Arianna Huffington and Sheryl Sandberg. We

Girls started the #ThisLittleGirlIsMe campaign, why

ended up with thousands of posts from women all

it is important to raise the aspirations of young girls,

over the world. They included a wealth of women from

and offers advice for professional women who would

different backgrounds and careers. We had scientists,

like to be an Inspiring Girls role model.

athletes, entrepreneurs, journalists, activists, film directors, authors, doctors, musicians – the list was

70

TELL US ABOUT THE #ThisLittleGirlIsMe CAMPAIGN. HOW DID YOU COME TO START IT?

endless.

We started #ThisLittleGirlIsMe to broaden young girls’

profile women, we were also inspired by the number

exposure to a wide range of roles they may never

of local women who got involved. I think this is what

have considered before. With young teens spending

helped #ThisLittleGirlIsMe become the campaign

a lot of time on their phones it’s important to fill

that generated the most buzz ever on LinkedIn –

WOMEN IN SECURITY MAGAZINE

And while we heard incredible stories from high


I N D U S T R Y

P E R S P E C T I V E S

something we are so proud of. As our founder, Miriam Gonzales Durantez, said, “It doesn’t matter if you’re a CEO or an intern, we all have a story to share and we can all do our part to support each other”. And it will be local women in their communities who will generally be the ones to provide mentorship and support to young girls.

WHY DO YOU THINK THIS CAMPAIGN RESONATED WITH SO MANY PEOPLE? Every woman was once a little girl with dreams. Some of them have been able to fulfil those dreams, and some of them are still working on achieving their dreams. So, it’s a process of women empowering other women and girls by sharing their experiences and life journeys, describing how they realised their ambitions. Those are very powerful messages for other women or girls who want to do something similar in a particular field.

I SEE INSPIRING GIRLS STARTED IN AUSTRALIA ONLY IN 2021. HOW DID THAT COME ABOUT? I first came across Inspiring Girls when I was in Hong Kong last year. They asked me to join as one of their role models because they loved my career journey. I had spent about a decade in investment banking before leaving when I realised my true passion lay

“For those considering becoming a role model, my advice would be to take the leap and do it. Young girls may not know much about cyber and protective security, and a role model could provide the inspiration that helps someone find their passion in this space”. - Jessie Li, Chair of Inspiring Girls Australia

in empowering and supporting women. experience of working in those fields gave them a Visiting different schools to deliver speeches for

little bit more certainty and confidence to pursue that

Inspiring Girls Hong Kong, I saw how much it meant

kind of career.

to the girls to have female role models. This was especially the case for those wanting to pursue a

So, I reached out to the headquarters with a proposal

career in a male-dominant field and not knowing what

to start a new chapter of Inspiring Girls in Australia.

to expect. Having someone in their life to share the

I’m hoping to create an environment for girls to

WOMEN IN SECURITY MAGAZINE

71


discover their passions at an early age, and also help

journeys. We don’t want women to shy away from

to boost their confidence.

filming a video or being role models because everyone has the potential to help and inspire others.

DO YOU HAVE LOCAL PARTNERS, SPONSORS, ROLE MODELS YET?

Also, this is not just about women empowering young

Julia Gillard is one of the role models on our video

girls. There might be women in other industries or

hub. She is someone who knows all too well what

sectors who are thinking about joining STEM, and this

working in a male-dominated industry is like, and

is a great opportunity to inspire them. Our video hub

the strength it takes to push past those barriers to

is open to all ages and backgrounds – an inspiration

achieve your dreams. We hope her words encourage

destination for all. I invite your readers to head to our

young girls to aim high and seek positions of

website and follow the links to put a video on the hub.

leadership.

We would love to hear their stories.

We are also working with local councils on some

WHAT ELSE DO YOU THINK NEEDS TO BE DONE TO RAISE THE ASPIRATIONS OF YOUNG GIRLS AND INCREASE THE VISIBILITY OF FEMALE ROLE MODELS?

exciting events next year, so stay tuned.

OUR MAGAZINE IS AIMED AT WOMEN WORKING IN CYBER AND PROTECTIVE SECURITY. WHAT ADVICE WOULD YOU GIVE TO ANYONE READING THIS WHO MIGHT THINK OF BECOMING A ROLE MODEL FOR INSPIRING GIRLS?

I think it’s something that should be cultivated at a very young age. By exposing girls earlier to a variety of opportunities, they can take the necessary steps and be more prepared to pursue certain sectors. That’s what Inspiring Girls aims to do – open these young

STEM is definitely a top focus for us. We would love

girls’ eyes, empower them to follow their passion, and

to invite more girls to think outside the box and go

ultimately create diversity in the corporate world. To

for roles in cybersecurity. We would absolutely love

achieve this, we need to stick together and support

to invite role models to come to the schools to speak

each other as much as we can.

about what it is like in their everyday working life in cyber and protective securities and what inspired them to pursue a career in the industry.

www.linkedin.com/company/inspiring-girls-australia

For those considering becoming a role model, my

www.inspiring-girls.com.au/

advice would be to take the leap and do it. Young girls may not know much about cyber and protective security, and a role model could provide the inspiration that helps someone find their passion in this space.

YOU HAVE A FEW AUSTRALIAN WOMEN FEATURED ON YOUR YOUTUBE CHANNEL. WHAT WOULD YOU SAY TO ANY OF OUR READERS WHO MIGHT BE INTERESTED IN FEATURING IN A VIDEO TO PROMOTE STEM ROLES, AND SECURITY ROLES IN PARTICULAR, TO YOUNG WOMEN? The video hub is not just for high profile women, we are calling for all women with interesting and inspiring

72

WOMEN IN SECURITY MAGAZINE

Volunteer application form airtable.com/shrODXT0dq3qvzEW3 www.instagram.com/inspiringgirlsaus/


SARAH IANNANTUONO

DEEPA BRADLEY

DATA CENTRIC STORYTELLING FOR CYBER SECURITY by Sarah Iannantuono and Deepa Bradley

“The most amazing thing for me is that every single person who sees a movie, not necessarily one of my movies, brings a whole set of unique experiences, but through careful manipulation and good storytelling, you can get everybody to clap at the same time, to hopefully laugh at the same time, and to be afraid at the same time.”

- Steven Spielberg

From the cave art of 30,000 BC, the fairy tales of

now has a prominent seat at the table and executives

the Brothers Grimm in the 19 century, to modern

are now required to communicate on cybersecurity

interactive videogames, stories have been used to

with authority.

th

entertain, educate, inspire and influence. It comes as no surprise that modern research has

BASEMENT HOODIE-HACKERS AND EXECUTIVE INFLUENCERS

shown one of the best ways to engage an audience,

While there is a concentrated effort to change certain

ensure your content is memorable, and build a

stereotypes in cyber security, there are still many

relationship is through the process of storytelling1. In

who perceive those within the field to be basement-

an enterprise context, storytelling is an effective tool

dwelling hoodie-hackers; great technically but perhaps

that can be used to influence stakeholders, inform

lacking in soft skills.

strategy and shape agendas. To drive an organization-wide cyber security program The last decade saw the profile and importance of

it has never been more important to brush up on

cyber security elevated to board level. Cyber security

soft skills and ensure there is a strong strategic

1

Sundin, A., Andersson, K. & Watt, R. Rethinking communication: integrating storytelling for increased stakeholder engagement in environmental evidence synthesis. Environ Evid 7, 6 (2018). https://doi.org/10.1186/s13750-018-0116-4

WOMEN IN SECURITY MAGAZINE

73


NARRATIVE + DATA = EXPLAIN VISUAL + DATA = ENLIGHTEN NARRATIVE +VISUALS =ENGAGE Source: Forbes

business capability within the cybersecurity team

insights targeted to your audience. For example, as

to translate the technical story into meaningful

part of a presentation to a hypothetical board ‘audit

business outcomes. Cybersecurity should be seen as

and risk committee’, you might focus on the status of

an enabler and market differentiator, supporting the

remediations for the firm’s IS0270001 audit, instead

business to meet enterprise objectives.

of looking at new vulnerabilities discovered and remediated.

Leaders should think of the ‘cybersecurity team’ as a trusted partner to enable the business, rather than the

Shifting the focus to the remediations of IS0270001

‘NO police’ stopping innovation and progress. When

can draw attention to the potential payoffs for the

communicating to C-suite or executive stakeholders,

business through the completion of the project. In the

it is critical to highlight the broader business risks and

case of IS0270001, achieving this certification will

opportunities through storytelling, and focus less on

facilitate the greater expansion of the client base in

pure technical security and compliance.

line with enterprise strategic goals.

“An effective way to harness storytelling for executive

It is therefore important that metrics are carefully

stakeholders is to combine your narrative, your visual

selected based on the key concerns of the executive,

and your data to influence and drive change.”

with the additional context of how the selected metrics will achieve business objectives.

THREE STEPS TO DRIVE IMPACT IN YOUR STORYTELLING

Two: influence through visuals Visuals can be used to convey meaning, allow

One: provide context through data

your audience to see patterns, and identify issues

Rich metrics can be harnessed to show a maturity journey that identifies the areas in which the cyber security team is meeting key business objectives. It is important to interpret and display data in such a way that it provides key, contextualised

74

WOMEN IN SECURITY MAGAZINE

Fun Fact: having an effective cybersecurity strategy mapped to business priorities can take a lot of the guesswork out of metric program development.


I N D U S T R Y

P E R S P E C T I V E S

that otherwise could not be seen without charts

non-technical audiences and leaders. Focusing on

or graphs. Visuals need to be carefully crafted to

knowledge sharing and raising awareness at all

clearly demonstrate interesting patterns, outliers or

levels, she delivers updates as a factual snapshot,

discussion objectives within the data.

with clear recommendations aligned to good practice examples. Sarah’s background in intelligence and risk

For example, you may use a graph to highlight

management is evident in her presentation style that

instances of data exfiltration by staff for each

takes complex topics, distils insights and presents

business area and month. You might also include

succinctly. Each presentation is tailored to the

scatter plot circles with colours based on periods of

audience, and it is not uncommon to see a little dash

high exfiltration and map these through storytelling

of humour in the presentation.

to what has been happening in the business. Narrative can engage and entertain an audience while BAM: Human Resources executives have identified

simultaneously explaining the why.

that a new initiative was not well-received by a team and can hypothesise, based on ‘time of data

SEEK is a market leader in online employment

exfiltration’, ‘team’ and ‘data taken’, that some people

marketplaces with deep and rich insights into the

may be gearing up to leave/considering leaving the

future of work. The SEEKurity team is on a journey

organisation.

to engage and ignite powerful storytelling to bring SEEKers together on a secure and seamless journey

An additional element of harnessing your data

to marketplace unification across its Asia-Pacific

visually is the considered use of presentation

platforms. Over the coming months, it will hone its

images and colours, which may be chosen to elicit a

executive storytelling skills to bring the firm on a

particular feeling in your audience.

unified security journey.

Three: unleash narrative

Key Takeaway - Every year billions of dollars are spent

The final step is to unleash the narrative that has

on books and movies, allowing us to escape into

been bolstered by the addition of data and visual

stories. Let’s make board meetings fun by making

elements. Centring the narrative around the notion

cyber security a trusted partner, using data, visuals

that “security is a trusted partner working to ensure

and narrative to craft stories to inform, influence and

the business meets objectives” will enable targeted

inspire.

and meaningful presentations to executives. Deepa

While incident recaps and war stories can be effective www.linkedin.com/in/deepa-bradley/

ways to communicate, there must be a balance to ensure cyber security is not seen as the proverbial ‘storm in a teacup’. Know your audience, business objectives and company ‘crown jewels,’ then target your presentation accordingly. Authenticity is important in storytelling so it’s important to make sure your narrative is true to you. When presenting to the executive, Deepa Bradley’s

Sarah www.linkedin.com/in/sarahiannantuono/

www.instagram.com/protectyodata/ medium.com/@protectyodata

background as a business turnaround director helps illustrate cybersecurity portfolio health and defines approaches required to uplift capabilities. Through regular executive reporting, she engages

WOMEN IN SECURITY MAGAZINE

75


JESS DODSON

MARTY MOLLOY

FRIENDS, COLLEAGUES, RED AND BLUE TEAMS, LEND THEM YOUR EARS! by Marty Molloy, Events, Marketing and Communications Coordinator, AusCERT and Jess Dodson, Senior Customer Engineer in Security & Identity, Microsoft As a member-focused organisation, AusCERT has a strong focus on relationships and on reinforcing the

security, I’ve slipped over from being pure “operations” into being “security operations”. My formal title is

strength of our community.

‘Senior Customer Engineer in Security, Compliance,

One such endeavour has been the annual AusCERT

I just call myself a ‘SecOps Witch’.

Conference. Since the inaugural event in 2001, our

My job involves helping organisations of all sizes

focus has been on profiling leading members of

and from all industries better understand the threat

the cyber community as keynote speakers, and on

landscape, better protect themselves and their

connecting industry professionals.

infrastructure, and better use the Microsoft tools they

Identity & Management’, but that’s a bit of a mouthful.

have at their disposal. Providing a platform for women in the industry to showcase their insights, skills and experience at

As for why, I like helping. I feel being part of the

the conference also helps to defeat the “imposter

“blue team” fits with that ethos of wanting to do

syndrome” that many in the industry experience.

the right thing and help where I can. I love passing

Showcasing the best representatives of our ever-

on information, and I love it when a customer or

growing and evolving industry also helps us to

organisation no longer needs me, because it means

continue the forward momentum we strive for.

I’ve passed on all the information I can, and they’re comfortable and confident to go it alone. I’m rather

One such person is Jess Dodson (a.k.a. Girl Germs)

prolific on Twitter as well (@girlgerms), ranting a fair

who I chatted with recently about how she’s been able

bit about basic security because I feel it’s something

to find her voice, and have it heard.

we see time and time again being the cause for major outages or breaches. I really want to help

Hi Jess, can you tell me a little about yourself (what you do, why, etc.)?

organisations get those basics right. In my (non-existent) downtime I’m a Lego addict. I

76

With close to 20 years of experience in systems

spend far too much money on it and proudly display

administration, identity management, and now

it in all my Microsoft Teams meetings. My latest Lego

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

creation is a QR code URL - which actually works! I’m

I want to get things DONE. I want to fix things. I know

a video gamer (when I have the time) and I’ve been a

that to get things fixed, to make changes, to see

Blizzard tragic for many years. I’m currently hoping

things improved, someone has to champion causes

to get some time over the holidays to play Diablo II

and be the loud voice saying, “We need to do this!”

Resurrected, because Diablo II is one of my all-time

And that’s me. I think that’s what drives me to keep

top five games. I am also a mum to a small human, an

going. Someone needs to be that voice.

incredibly intelligent, stubborn and cheeky four year personality...

How can cyber organisations, and the cyber community in general, help individuals like yourself find a voice and have it heard?

How did you come to be involved with AusCERT?

I’ve spoken about this extensively as part of a talk I

I knew about AusCERT from way back when I

gave at CrikeyCon in 2019 (CrikeyCon 2019 - Jess

first started in IT. I worked for the University of

Dodson - Women’s Stories from the Tech Trenches

Queensland, so had some knowledge of AusCERT

- YouTube). There’s so much that can be done, but I

activities back then, as well as receiving threat

think the biggest point is for organisations to listen

intelligence from it. As time went on, I became friends

when women members speak up about something.

with AusCERT employees, and I’ve kept in touch since.

Call out colleagues when they say sexist, racist,

I most recently came to be involved with AusCERT

homophobic, transphobic, or ableist things. Change

through submitting a talk for their 2021 conference

hiring practices so that women feel more included

and was incredibly thrilled when my talk was picked.

and see roles being presented are being for them.

old - don’t know who she could take after with that

There is so much organisations and the community What opportunities and/or advantages do you think you’ve had by being a speaker and panellist at AusCERT conferences?

can do, and I hope we can move the needle a bit further on this so the next generation is not living our realities.

The chance to be seen as a security technologist, finally. Previously, I’ve been known as an identity

What would you like from Santa this year?

person or a Windows sysadmin. Speaking at AusCERT

I wish I wasn’t a slave to my capitalist masters and

and being privileged and honoured to be invited to

I could say “nothing”, but in truth, I would absolutely

be on the keynote panel meant I was finally seen as

love the new Lego Star Wars UCS AT-AT recently

being part of the security community. That has been

announced. At 62cms high and 69cms long, I have no

an advantage. It has allowed me to put my foot in the

idea where I’d put it, but I don’t care...I really want it!

door with this community, as well as being a huge

Thanks so much for your insights and time Jess and,

opportunity for me. I was invited, off the back of my

may you continue to educate, innovate and build

AusCERT presentations, to give a keynote for the

Lego.

Australasian Higher Education Cybersecurity Service (AHECS), which took place on 10 November. I am truly

Jess

grateful to AusCERT for taking a chance on me and www.linkedin.com/in/jrdodson/

letting me speak not once, not twice, but THREE times as part of AusCERT 2021.

girl-germs.com/

How do you maintain a positive outlook and/or defeat the negativity that can creep in?

Marty

I have the same level of cynicism and snark as anyone in the industry, but deep down I am a perpetual

www.linkedin.com/in/marty-molloy-14100932/

optimist when it comes to security. I think that comes from feeling someone has to be that way, or else

www.auscert.org.au/

nothing is going to get done. I’m stubborn and strongwilled and obnoxious to the point of being annoying.

WOMEN IN SECURITY MAGAZINE

77


UNIQ YOU’S MISSION: GET MORE GIRLS ENTERING MALEDOMINATED INDUSTRIES by Stuart Corner

A new service, UNIQ You, launched in Queensland in

One of the partners, Skedulo, a Brisbane based

November, aims to get more girls entering industries

developer of scheduling software and software for

where women are presently underrepresented by

mobile workforce management, will provide the

building a more robust understanding of these

software to manage the relationship between girls

industries and the roles within them.

and their advisors, including scheduling of their virtual meetings.

UNIQ You will connect high school girls and their guidance and career officers with female advisors

UNIQ You is the brainchild of Tanya Meessmann,

drawn from industries where women are under-

founder of Girl Shaped Flames: a service that

represented.

connects high school girls with role models to help them build confidence.

Thirteen corporate foundation partners from industries that have less than 40 percent

She said, by connecting girls with relatable,

representation of women have signed on for the

inspirational female role models across a diverse

program: Aurecon, BMD, Boeing, Hutchinson Builders,

spectrum of industries, UNIQ You would “address

Origin, Oz Minerals (SA), Seqwater, Shell’s QGC

their exact queries, concerns and curiosity around

Business, Skedulo, Tesserent (VIC), Urban Utilities,

what these career pathways can offer.”

Ventia and Yurika. Female advisors from these thirteen corporate partners will give their time to provide industry insights to grade 9 to 12 high school girls from 30 schools in Queensland through personalised one-onone video calls. In its first year UNIQ You aims to connect more than 600 girls with 100 female advisors across 10 industries. Many of the sponsor organisations are national or multinational and the plan is to secure further funding and take the program national if the Queensland pilot proves successful.

78

WOMEN IN SECURITY MAGAZINE


For more details, connect with SheLeadsTech Melbourne:

https://oneintech.org/our-programs/sheleadstech/ https://www.linkedin.com/company/sheleadstech-melbourne sheleadstech@isaca-melbourne.org.au

Feel free to connect also with your local ISACA chapter.


I CHOOSE TO CHALLENGE… COMPANIES TO EXPAND YOUR THINKING by David Braue

A DEI mission statement doesn’t make you diverse

S

ince 2014, McKinsey & Company’s

Yet no matter how much we all understand that

studies into the financial benefits

diversity is beneficial to the business, companies

of diversity have become a rallying

are still terrible at implementing it, with a recent

cry for diversity, equity and inclusion

Dream Collective survey finding that 61 percent of

(DEI) advocates – and sage advice

respondents had not seen any significant change to

for business leaders struggling to

their working environment.

progress pursue dramatic transformation initiatives due to problematic staffing shortages.

And, despite a similar percentage of men reporting that they are both aware of and willing to participate

In case you’ve been sleeping, McKinsey’s conclusion

in DEI programs, 48 percent of respondents said they

was clear in 2014, and has only gotten stronger in

are feeling fatigued by discussions around diversity –

two subsequent reviews: companies with highly

with a third of respondents reporting that the diversity

gender diverse executive teams are 25 percent more

programs led by their companies’ HR departments

likely to outperform their less-diverse peers, with an

are “not at all motivating or engaging”.

even stronger improvement – 36 percent – correlated with high rates of ethnic diversity.

Maybe there’s more to improving DEI than PowerPoints and sweeping corporate visions. Maybe

Can you think of any other initiative that promises

the way to live the McKinsey dream is to actually do

such striking benefits for so little effort?

something about diversity – and let everyone know why it’s the best course of action.

We can’t, either. All you have to do is to be fair. Hire

80

and promote more women and non-white people.

HERE’S SOMETHING THAT DID WORK

Embrace diversity and everyone will be happier, more

Since many managers struggle to think in ways

productive, and better off.

that aren’t financially related, one approach that has

WOMEN IN SECURITY MAGAZINE


F E AT U R E

proven successful is for managers to simply accept

where staff can go for prayer, quiet time, or to put

that diversity will help the business both socially and

on provided noise-cancelling headphones to reduce

financially – and then listen to the people that it most

stimulus that may cause them distress in the normal

directly affects.

working environment.

This approach has worked well for Aussie Broadband,

“Almost every single thing, every single outcome

the Internet service provider whose work around DEI

or action that we’ve done, every single program

helped it win the Diversity and Inclusion category

that we’ve run, has been staff-led – raised by staff

of the recent ACOMM telecommunications industry

because they feel comfortable to do so,” community

awards.

impact manager Caroline Kennon told WiS, noting that the company’s leadership team “have always

The company’s Pride Committee, for example, has more than 100 people in it – a massive number considering

of physical spaces within

Everyone is incredibly different, and needs different things out of their workplaces. It comes from that real focus that staff should always feel like they can bring their whole selves to work. And if you work with that fundamental, then you have to recognise all the different things that make staff, as opposed to targets that really silo them into a single group.

the company’s office as low-

- Caroline Kennon, Community Impact Manager Aussie Broadband

that the entire company has just 700 employees. Other working groups include Reconciliation Action Plan, Inclusion and Diversity, and a newly formed Neurodiverse group. Committees are only one part of the company’s DEI work: the recent allocation

stimulus, low-lighting Room of Any Requirement (ROAR) rooms

WOMEN IN SECURITY MAGAZINE

81


had a real focus on diversity and inclusion being their responsibility to thrive and be a part of.” The guidance of the special-interest groups has not only empowered the workforce to advocate for workplaces changes to support employees while in the office, but is also being tapped to rework operational processes that may have been

women grow to 32 per cent of the workforce in a few

inadvertently marginalising of diverse workers.

years.

Members of the neurodiverse working group, for

Kennon believes this growth has come because the

example, worked with HR to address some aspects

company has avoided tokenistic, binary approaches

of the recruitment process that can often put off

to equality and instead has implemented policies that

potential neurodiverse applicants.

understand that men, women, and gender-diverse employees can’t be defined simply on those criteria.

This means, for example, decluttering the layout of job ads, providing questions before the interview

“Everyone is incredibly different, and needs different

to provide time to prepare, or offering remote video

things out of their workplaces,” she explained. “It

interviews because “they might be able to manage

comes from that real focus that staff should always

their anxiety a bit more from home just for the

feel like they can bring their whole selves to work.

interview”.

And if you work with that fundamental, then you have to recognise all the different things that make staff,

“People with anxiety or ADHD will respond in really

as opposed to targets that really silo them into a

different ways to a traditional interview situation

single group.”

when thrown questions that they haven’t been able to prepare for, or where they may talk about things

TIME TO EXPAND YOUR THINKING

that are a bit divergent from what the question was,

This, then, is the hidden caveat behind McKinsey’s

because that’s the angle their brain takes.”

analysis: just balancing gender numbers won’t give you the kind of diversity that you need.

“That doesn’t mean they’re not suitable for the role,” Kennon said. “It just means that in that situation,

In a business climate where the so-called

it was incredibly difficult for them to engage in the

‘great resignation’ is pushing employees to

way that we had already put into this very structured,

reinvent themselves – and to not be afraid to

traditional framework.”

take radical steps to distance themselves from unaccommodating workplaces – business survival

Aussie Broadband’s experiences in improving

will depend on the ability to meet employees on their

diversity have produced a workforce that is both

own turf.

engaged and proactive, garnering the company an 86 percent positive Great Place To Work rating

And if you’re one of the companies that has been

– compared to the median of 55 per cent across

crowing about adding women to your board or C-suite

typical Australia-based companies – that ranked it

as though it magically makes you diverse enough,

the country’s 16 best workplace for medium-sized

please stop right now.

th

companies. This is one area where walking the walk is way more

82

Significantly, the company did not set specific targets

important than talking the talk – and even the oft-

for gender diversity – yet has seen representation of

cited checklist of family-friendly items, like extended

WOMEN IN SECURITY MAGAZINE


F E AT U R E

to them, their organisation, and their success,” they said. “These

Just because you have DEI metrics doesn’t mean that you have DEI ownership. Sharing high-level goals that are cascaded down to your IT leaders tends to create only a vague path forward.

comments and questions aren’t necessarily new – but what is new is that we’re starting to see the demand for demonstrated, measurable results.” Delivering those results has been challenging, Justice added, given that DEI initiatives have conventionally been top-down mandates with little supporting

maternity leave and paternity leave, just doesn’t cut it

tools for tracing or ensuring accountability.

anymore. “Just because you have DEI metrics doesn’t mean that “That’s all standard now,” said Kennon. “Why are you

you have DEI ownership,” they said. “Sharing high-level

congratulating anyone who’s doing that stuff? That’s

goals that are cascaded down to your IT leaders tends

the baseline expectation. It’s nothing groundbreaking,

to create only a vague path forward.”

it’s narrow-minded, and it’s certainly not diverse when you just look at gender.”

“Simply seeing the numbers doesn’t create the personal ownership that we need, especially if leaders

A recent WILEY survey of tech workers confirmed

aren’t being held individually responsible.”

that potential workers are already evaluating your company culture long before they’ve signed on.

“It’s overwhelming for the leaders that we are expecting to take action,” they added, “and the stress

Fully 64 percent of survey respondents said,

of all this is falling on the shoulders of IT leaders who

for example, that they believe technology hiring

really don’t know what to do.”

discriminates against people from minority backgrounds and half of young tech workers reported

Existing dynamics had made it hard to establish

leaving, or wanting to leave, a tech job because they

consequential accountability for driving real

felt uncomfortable or unwelcome.

change through companies’ recruitment programs, operational policies, and everyday employee support

The onus is on companies to fix this – not only to

and engagement mechanisms – but regular and

add gender diversity to the hiring process, but to add

ongoing engagement can help change all of that.

transparency and adapt processes to ensure they don’t disadvantage employees that would otherwise

Conventional diversity metrics “can often bring

be a significant asset for the company.

resentment from other groups,” noted Aussie Broadband’s Kennon, reiterating the importance of

“People want to see the identities and voices that

executive guidance and engagement at every level.

organisations are bringing to the table,” noted LJ Justice, research principal with Gartner, who noted

“We know that trickles down,” said Aussie Broadband’s

that executives “are all feeling mounting pressure

Kennon. “When staff see [executives] being there,

when it comes to moving the needle on DEI.”

they understand that that’s part of what we do at Aussie Broadband. And we’re seeing results from that

“Employees are asking CEOs and their IT leaders to

strategy.”

set aside time and space to discuss what DEI means

WOMEN IN SECURITY MAGAZINE

83


NICOLE STEPHENSEN

BUILD INTEREST AND THEY WILL COME by Nicole Stephensen, Privacy expert and Director of boutique privacy firm, Ground Up Consulting

Over the past few months, through campaigns

100 percent, possibly! But please, let’s not pigeonhole.

such as #ThisLittleGirlIsMe, I’ve read tremendous

After all, I am in cyber. I’m a crossover. I’m principle-

stories — uplifting, poignant and deeply moving

based decision-making meets follow-the-rules. I

recollections of getting from ‘there’ to ‘here’ — from

focus on personal information as a subset of all the

women all over the world in a variety of sectors,

data cyber folks are tasked with protecting.

disciplines and leadership positions. The idea behind #ThisLittleGirlIsMe is that girls and women cannot

STEM refers to science, technology, engineering

aspire to be what they cannot see.

and mathematics. It’s a grouping of disciplines we often see referenced in the context of education

In addition to inspiring others, these stories felt to

policy and the building of school curricula that

me like a fabric whose threads were the outreach

will orient young minds to the challenges and

of thousands of authentic selves — rather than any

possibilities of their future lives. A strong foundation

perceived sameness of experience — connecting and

in STEM subjects, plus the development of soft

interconnecting women.

skills like communication and leadership, can lead to diverse career paths where those core technical

This brings me to a recent conversation about

competencies shine through.

encouraging more women to start (or shift into) a career in cyber. I had been expressing my need to

And there are so many women whose contributions

find a skilled junior consultant to join my privacy firm,

to their fields — and to humanity — have inspired the

and expounding my view that the privacy discipline

generations who followed them. An online search

had become naturally (wonderfully) entwined with the

for ‘famous women in STEM’ will fill your afternoon

likes of risk management, public policy, information

with the stories of Marie Curie, Ada Lovelace, Grace

security and, increasingly, cyber. But then I heard a

Hopper, Chien-Shiung Wu, Jane Goodall and Annie

comment that put my nose out of joint: ‘A greater

Easley, to name a few.

focus on STEM will mean more women in cyber careers’.

84

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

I don’t fit into the STEM camp. I’m Arts all the way. They lost me at fractions in primary school, and I have a passing, and probably inaccurate, remembrance of the Periodic Table of Elements (Ask me about the cool Periodic Table of Privacy published by Calligo, though, and I could teach a course on it). I attended university on an honours English scholarship, and was a creative writing major — for the uninitiated, that’s poetry and playwriting —and was deeply moved

abuse and want to prevent this insidious behaviour

by courses in Holocaust literature and the frankness,

from impacting others.

and fearlessness, of authors like Jerzy Kosinski (The Painted Bird) and Elie Wiesel (Night). It was these

Some have policing backgrounds and have moved

that led me, ultimately, to political science. I know, I

into online policing roles, focused on areas such as

know, poli sci has aspects like international relations

fraud prevention and detection and the elimination

theory and game theory (e.g. the Prisoner’s Dilemma)

of child exploitation. Some are educators who see

that push it into the realm of soft science (ahem,

employees as an organisation’s greatest line of

STEM), but in the main my concern was always with

defence. A few are military veterans whose aptitude

the writing, the connecting, the understanding, the

for threat hunting extends to the deep, dark corners of

illustration and treating of the wicked problems facing

cyberspace.

humanity. Some are public policy makers keen to see improved I suppose if you add an ‘A’ to STEM (to get STEAM),

legislative safeguards for personal information (and

the problem of where an arts person fits in the cyber

other data), aged care advocates tired of watching

career pathway is dealt with. But is it really? If the

elderly friends and family fall victim to scams, and

nature of our disciplines, rather than the nature of us

volunteers ready to lend a hand with identity recovery.

— who we are as women, what motivates us — is the

All of these women — the whole complicated, diverse,

key to defining our career, aren’t we missing the point?

engaged, clever, motivated, multitalented melee — have found their way to cyber.

Of the women I know in cyber, only a few actively pursued their career path purely as an off-shoot of

What do I think brought them here? Interest.

a STEM discipline. I know some who don’t have a formal discipline, but rather ‘a calling’ to serve the community. Some are keen to do work that directly

www.linkedin.com/in/nicole-stephensen-privacymaven

protects their kids in online environments. Others have witnessed or experienced technology-facilitated

www.groundupprivacy.com.au

WOMEN IN SECURITY MAGAZINE

85


COZMOS: CHOOSING TO CHALLENGE A PLATFORM BUILT WITH DIVERSITY AND INCLUSION IN MIND by Laura Jiew, External Engagement at UQ ITEE

The University of Queensland’s School of Information Technology and Electrical Engineering (UQ ITEE) has been hosting its annual Innovation Showcase event since 2012. It is a cornerstone faculty event that gives students the opportunity to highlight the range of their end-of-year and capstone student projects.

This year a new prize category was introduced: Best Diversity & Inclusion Application Project, specifically targeting student projects with a strong gender diversity and female representation. The inaugural winners of this prize category were Vanessa Ackermann, Sophie Bates, Cassandra Carse,

Students who take part in the event are eligible to

Cassia Gulley, Ashleigh-Rae O’Neill and Brooke Powell

win $1,000 in prize money, thanks to the generous

with a project titled Cozmos; a neurodivergence-

sponsorship of various industry organisations. Entries

friendly chrome extension and web application

this year fell within the broad areas of electrical

designed to facilitate and encourage a safe and

engineering, information technology, computer

engaging online community for people with autism

science, software engineering, design computing,

spectrum disorder (ASD).

multimedia design and cybersecurity. Cozmos is a social platform designed to ease social On the evening of Thursday 4 November 2021

difficulties among autistic adults by encouraging

more than 100 students participated making 45

connection through shared interests.

submissions in more than a dozen prize categories

Technology designed for an autistic audience has

to showcase their end-of-year projects to industry

often focused on suppressing ‘undesirable’ traits.

sponsors and guests, VIPs and the wider university

Cozmos takes a different approach, providing a

community.

space for users to express themselves, and forge meaningful connections with like-minded people.

86

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

Best Diversity & Inclusion Application Project by Blackbook.ai _ Team Cozmos

that sets students the task of designing a social or Cozmos is a social mobile-computing project created

mobile technology to address the needs of a specific

as a product of thorough UX research, qualitative

domain – specifically, the various ways that social

inquiries and literature study. The platform, a

awareness can be built into technology features.

prototype, has been designed to accommodate the needs of participants and encourage them to focus

Whilst it is a compulsory course for UQ’s Bachelor

on their strengths and individuality.

of Information Technology (User Experience) and Master of Interaction Design students; it is also taken

A Blackbook.ai representative who attended the

as a popular elective course by students enrolled

Showcase event as a judge and industry sponsor

in the Bachelor of Software Engineering, Bachelor

for the Best Diversity & Inclusion Application Project

of Computer Science and Master of Information

category was blown away by all the entrants, but the

Technology students as well.

winning team from project Cozmos, was an absolute standout.

In this course, students are encouraged to form a team with fellow students who share similar interests.

“Team Cozmos has put much work into the user

Luckily, all six of the project’s team members were

research and interaction design of their product,

interested in mental health and accessibility. Some

and I’m so excited to see this hard work continue to

team members have family members with autism

pay off.”

or are neurodivergent themselves — hence the

- Brooke Jamieson, Head of Enablement AI/ML and Data, Blackbook.ai

motivation to address this issue. The team wanted to design something positive, something that celebrated autistic traits instead

Cozmos was developed as part of DECO3500, a

of trying to hide them. With that goal Cozmos was

university course on social and mobile computing

conceptualised.

WOMEN IN SECURITY MAGAZINE

87


I N D U S T R Y

P E R S P E C T I V E S

“Being neurodivergent myself and having been involved in online autistic communities in the past, I have witnessed and experienced the frustration with research being mainly curative-focused and mostly aimed at young autistic males.

especially Brooke from Blackbook.ai was incredibly

“This has left autistic adults — particularly women

inspiring, and our team is more driven than ever to

and non-binary or ‘assigned female at birth’

get this project to the next stage. We are aiming to

also known as AFAB folks — with little access to

finish developing the site over the summer holidays

resources.”

and work with UQ to deploy it early next year.”

- Cassandra Carse, currently pursuing a Master of Information Technology with a focus on web and software development.

- Team Cozmos

Women’s role in technology and STEM has always Vanessa, Sophie, Cassandra, Cassia, Ashleigh-Rae

been integral, from Ada Lovelace, known as the

and Brooke are all students of interaction design,

first computer programmer, to brilliant women like

software engineering and information technology

Katherine Johnson working on computers at NASA.

and are passionate about encouraging more girls and women to pursue STEM and computing based

Don’t let anyone make you feel you do not belong.

studies. When asked to describe their feelings after

Continue supporting each other and be confident

winning this inaugural prize category, the team had

about what you have to offer. The tech industry needs

this to say:

more diverse perspectives to grow, and would not

“Regardless of whether we won the award or not,

exist without women. Keep choosing to challenge!

the team knew our project could be impactful for

- Team Cozmos

autistic adults and we had planned to continue developing it after the semester finished. However,

www.linkedin.com/company/uq-itee

winning the award has been SO encouraging. “Being able to talk to industry representatives,

88

WOMEN IN SECURITY MAGAZINE

twitter.com/UQSchoolITEE


The big picture! We look after the marketing and content as add-on modules for your business so you can get on with what you do best - running your business

As-A-Service our products are Customised Client Programming we are

Strong Unbeatable

www.source2create.com.au PA S S I O N A T E - I N N O V A T I V E - C R E A T I V E - T R U S T W O R T H Y - I N S P I R I N G - Q U A L I T Y S O L U T I O N S


BAYA LONQUEUX

CYBER RESILIENCE IS NOT A TREND BUT A NECESSITY by Baya Lonqueux, CEO at Reciproc-it

The health crisis we have just experienced was

This recourse to digital solutions was opportunistic,

undeniably an unforeseeable shock that highlighted

generally unanticipated, and therefore poorly

our vulnerability. Our habits and our daily lives have

organised. It made companies more vulnerable, more

been stress tested during these past two years. We

exposed to cyber-attacks. We saw an explosion in the

had to react quickly and face this unexpected event

number of cyber-attacks, and many public and private

as best as we could.

companies suffered the consequences.

Emergency measures were taken worldwide to

The primary lesson from this crisis is that we need

contain the epidemic. Biotechnology and research

to strengthen our resilience to improve our ability

were mobilised to find a cure and strengthen our

to recover from adverse health events, as well as

immunity and resilience.

adverse technological events.

Containment measures were applied to limit the

The digital world is a revolution without limits for our

spread of the virus. Other measures were required to

emancipation, a godsend with strong advantages,

ensure the continuity of our economic activities and

but only if the risks that accompany this revolution

guarantee the survival of our companies.

are anticipated and simulated, and measures put in place to counter them. And also, not to neglect the

Recourse to telecommuting was one solution

prevention and anticipation, two determining factors

implemented (often at short notice) by a good

to reinforce our resilience.

number of companies. Digital technology allowed us

90

to run our companies and enabled the virtualisation

This new period of disruption, of positive

of the world of work.

transformation, of “working differently” has brought

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

benefits and efficiency. But the dangers and threats

We need mature approaches to counter cyber risks,

are constantly multiplying, demanding increased

whatever the size and activities of our organisations.

vigilance from all users.

To achieve this maturity, we must encourage collaboration and cooperation between companies.

We need to assess the level of maturity we have

This is the only way we can expect to improve global

reached in managing the security of our information

security.

systems, and our relationship with cybersecurity. It is more than urgent to break the taboos of “the • Are we all ready to face the cybersecurity risks in a homogeneous way?

attacked victim is not reliable” and of “the victim denial”

• Have we done everything to protect ourselves, our companies, our assets, our data, etc? • Do we know enough about our risks to anticipate, manage, and control them? • Is our technology analysed and simulated to

We are all equal in front of cybercriminals: no one is safe from a cyber-attack. Feedback on a cyber-attack is a valuable asset, data on which we can build our cyber resilience.

identify vulnerabilities and flaws, to determine our exposure to cyber-attacks?

Let’s enrich our knowledge of cyber threats and our cybersecurity culture to help our companies and

The answers to these questions are a prerequisite to

organisations be resilient.

countering these new threats. There needs to be a more global approach to the

Reciproc-it www.linkedin.com/company/reciproc-it/

challenges of cyber threats that considers the context to protect, its components the strengths,

www.linkedin.com/in/bayalonqueux/

and weaknesses of the entire ecosystem. This approach must be coordinated and collective to

https://twitter.com/reciproc_it

create resilience and implement remediation of vulnerabilities without major consequences.

reciproc-it.com/en/blog/

WOMEN IN SECURITY MAGAZINE

91


MEL MIGRIÑO

UNDERSTANDING THE DYNAMICS OF THE SECURITY ORGANIZATION by Mel Migriño, VP and Group CISO of Meralco, Chairman of Women in Security Alliance Philippines

There is no such thing as a perfect model for

must look at the “best fit” structure that reflects the

cybersecurity organisations, or a one-size-fits-all

reality of their organisation and should continually

structure that will deliver robust cybersecurity.

assess the effectiveness of their security teams and

Cybersecurity and risk management leaders in every

recalibrate as needed.

organisation must develop their own model taking into consideration the organisation’s risk appetite,

Leaders need to also be aware of macro trends that

available resources and the challenges of digital

impact the evolution of an organisational structure.

transformation.

Examples of such trends are digital transformation and customer centricity.

There are several factors that influence the design of an optimal cybersecurity team. This task is made

These macro trends increase the rate of change

more challenging by the global skills shortage, which

and complexity in digital adoption. They in turn

makes organisations more dependent on consultants

require constant change in security processes and

and managed security service providers.

capabilities, and potentially lead to the emergence of new security roles such as security champions,

Cybersecurity and risk management leaders should

vanguard security architects and digital risk officers:

consider a broad range of factors when designing

new and exciting roles in the evolving digital

their security organisations, among these are

ecosystem.

maturity, governance, size, culture and budget. Persistent security skills shortages have forced Perfection is impossible. Instead, security leaders

92

WOMEN IN SECURITY MAGAZINE

security leaders to explore new ways of obtaining


I N D U S T R Y

P E R S P E C T I V E S

and managing security capabilities. Managed security

conflict of interest and a cultural disconnect

services and contracting have been the standard

between security and the business, because

staff augmentation solutions, but more creative

every organisation has unique needs and a

approaches should be adopted. Possible options

distinct risk appetite to be managed.

include the appointment of security champions at the business level and the creation of logical cyber fusion

While these guiding principles are crucial to the

teams for faster analysis, investigation and resolution

successful design of the security and risk teams,

of security issues and incidents.

there are other factors that influence the design of the security and risk teams.

However, changing the security organisation structure just for the sake of doing so should be avoided There are guiding principles that should be considered.

• The risk appetite of the organisation — that is, the level to which it will proactively invest in security strategies to mitigate risk.

1. Assess which security capabilities are required (e.g., application security, cyber resiliency) and broadly define the processes that the capabilities will be based on, including

• The strength of governance exercised by the board and top management. • The industry vertical that the organisation operates in.

high-level process flows and the responsible,

• The traction of the information security activities

accountable, consulted and informed (RACI)

and behaviours with the business and corporate

matrix.

risk management and compliance functions. • The corporate culture — the level to which

2. Aim for a separation of oversight and

federation and decentralisation fit the cultural

execution that is logical and ensures these

and governance makeup of the organisation.

two functions are independent. A key objective

• The exercise of authority, power and influence

of security organisation design is to achieve

by the CIO. The level of support the CIO extends

appropriate levels of separation between cyber

affects the independence and success of the

defence, IT operations and IT delivery teams. For

security team.

example, the network security team may process requests and approve changes to firewall rules while the security administration team reviews

• The regulatory compliance requirements the enterprise is subject to. • The convergence of IT and operational

and implements the changes. This separation is

technology and where cybersecurity and risk

one of the main drivers for moving the reporting

priorities are positioned.

line of the CISO out of the IT organisation. It is important to note that a structure may be optimal 3. Don’t aim for perfection. You will never

for a specific organisation only at a specific time. As a

achieve it. Given the number of factors that

result, cybersecurity and risk leaders need to assess

influence the design of a security team there is

the triggers that may influence various choices

little chance that the first attempt at structuring

and decisions. These include changes in regulatory

the team will be anywhere near perfect. The best

landscape, business requirements, and an increase

approach is to implement a new design and then

in security’s scope of work. Review and calibration

refine it through practical experience. Strive for

of teams’ capabilities vis-a-vis overall business

measurable continuous improvement.

objectives should be undertaken often.

4. Do not be overly reliant on industry recommendations or company comparisons. Such practices will inevitably lead to possible

WiSAP www.linkedin.com/company/wisap-women-in-securityalliance-philippines www.linkedin.com/in/mel-migri%C3%B1o-b5464151/

WOMEN IN SECURITY MAGAZINE

93


I CHOOSE TO CHALLENGE… EVERYONE TO SPEAK UP by David Braue

There are other reasons many women prefer to work from home

A

fter two years of working from home,

“A lot of them were saying that they had to look for

managers eagerly awaiting the return

other places where they weren’t being flexible,” AWSN

of employees to the office have been

founder and CEO Jacqui Lostau said during the

in for a rude shock: fully 57 percent of

recent Australian Cyber Conference. “There are a lot

Australian workers want to work three

of women that have left the industry, and we’re going

or days remotely each week going

to have a lot of work over the next few years to try

forward, according to one recent survey, and 14 per

and bring that back.”

cent want to work exclusively from home. Winning those women back will require more than The news has been eye-opening for many managers

just a big office refurbishment. For many workers, the

who assumed their employees were as eager to get

problems lie not just in questions of whether they are

back into the office as they were. Yet employees’

more effective working at home or in the office, but

motivations are often different, with concerning

whether they feel comfortable going to an office now

figures suggesting that many women found the shift

that they no longer have to.

to remote working to be a relief. Problems with workplace culture are everywhere Women in particular were reporting work flexibility

– as outlined in excruciating detail in the recent

to be crucial for their needs, with many members of

Jenkins report, which examined the culture at

the Australian Women in Security Network (AWSN)

Parliament House in Canberra and found 51 percent

reporting that they had become burnt out during the

of people working in Australia’s 228 Commonwealth

pandemic and had found it “really, really difficult” if

parliamentary workplaces had experienced bulling,

companies didn’t offer part-time or flexible work.

sexual harassment, or actual or attempted sexual assault.

94

WOMEN IN SECURITY MAGAZINE


F E AT U R E

More than 1700 individual submissions outlined a degrading, distressing culture where women face daily harassment and unwanted sexual advances – with Sex Discrimination Commissioner Kate Jenkins reporting that “current systems and reward structures encourage, tolerate and enable misconduct and processes that are not equipped to prevent or address the consequences of that behaviour.” If you think the Parliamentary situation is an extreme situation, and that nothing like that could ever happen in your workplace –

“We’ve got to make sure that leaders and managers of business units understand what our employees want, and appreciate and offer them that environment. You’ve got to understand each of your employees and what makes them tick, and what works best for them – and if you haven’t got that attitude, you’re really going to struggle.” - Darren Kane, Chief Security Officer, nbn

think again. Fully 51 percent of women who

FIXING WORKPLACE ATTITUDES

weren’t working remotely before the pandemic say

With employees resoundingly less likely to rate the

their safety has increased since they were forced

in-office work experience as positive – just 52 percent

home by the pandemic, according to an extensive

of in-office workers did so, compared with 64 percent

Gartner analysis that found 39 percent of knowledge

of hybrid workers and 66 percent of remote workers

workers might well leave if their managers insist on a

– companies need to fix this culture quickly as the

‘hard return’ to working fully onsite.

business world repositions itself for whatever new kind of normal awaits us in 2022.

Many managers found it had to accept that employees might feel more productive at home; to

As the Jenkins report highlighted, fixing such issues

hear so many women to suggest that they feel unsafe

is hard when they are not being openly discussed

in the workplace will be confronting for many.

in any meaningful way; rather, in Parliament and in many private workplaces, toxic culture tends to

So, too, will reports that knowledge workers with a

fester, unrecognised and unfixed, until the bombshell

disability are also finding workplace culture to be

moment when it goes completely out of control.

destructive to their well-being: 81 percent say they feel respected in a hybrid or remote working environment,

In an ideal workplace, employees would call out toxic

compared to just 56 percent when working onsite.

behaviour when they see it, escalating to managers who would act swiftly and decisively to shut it down.

Also concerning is the finding that 82 percent of employees believe they work in an unfair working

There are signs that men at least recognise the

environment – citing factors such as a lack of

importance of shutting down derogatory gender-

acknowledgment, little information, poor support, and

based comments, with a recent Dream Collective

feeling like they are considered by managers.

study finding that 65 percent of Australian men

WOMEN IN SECURITY MAGAZINE

95


believe that gendered stereotypes and inappropriate

male archetypes – each with varying senses of their

comments have a negative effect on the workplace.

impact on others, and the importance of men in achieving gender equality.

Stunningly, one in eight respondents believes such situations have a positive effect in the workplace.

Just 17 percent of men are likely to be true ‘allies’ for gender equality, the report found, with 41 percent

Putting that worrying finding aside for a moment,

likely to be difficult to engage because they consider

however, the study also suggested that 70 percent of

themselves as having a minor impact on what others

men would feel comfortable about speaking up when

think, and believe that men have little or no role to

they saw such behaviour.

play in gender equality.

Yet, the study noted, “’reporting’ behaviour like this is

For managers wondering where to start, a good

most likely to be informal. Men are most comfortable

target is the 37 percent of men who believe men are

speaking to another colleague, and least comfortable

critical to gender equality but consider themselves as

speaking to HR or other staff management.”

having only a minor impact on what others think.

How would it work in your own environment? Would

Senior managers are most likely to consider

staff tell a manager about inappropriate comments

themselves as having the ‘ally’ archetype while lower-

so they can be actioned? Or would they just tell a co-

grade workers are most likely to need empowerment,

worker over morning tea, shake their heads, and get

through direct advocacy and engagement, to help

on with their day?

reinforce the idea that gendered, confrontational behaviour is unacceptable – and that everyone in the

Attitudes towards speaking up about degrading or

workplace should be doing something about it.

marginalising conduct are tied closely to notions of allyship, with The Dream Collective identifying four

Tellingly, younger workers may be most successful in this regard, since they were by far the most optimistic

96

WOMEN IN SECURITY MAGAZINE


F E AT U R E

about their ability to impact the attitudes and actions

traditional office environments – and how their

of their colleagues.

working arrangements can be adjusted accordingly.

BUILDING THE NURTURING OFFICE

“Things have changed, but people are blaming COVID

Two years of hybrid and at-home work have cemented

as the trigger for the change,” said Darren Kane, chief

the value of workplace flexibility, with fully 34 per cent

security officer with NBN Co, who noted that the

of Australian workers saying that they had been more

network’s original goal of enabling work flexibility was

productive since the pandemic began – including

accelerated dramatically by the pandemic.

42 per cent who attribute this to flexible work hours and 23 per cent saying they enjoyed their new work

“The whole concept of what we’ve now got is

spaces or found it less distracting socialising with

flexibility,” said Kane – who was recognised as a

coworkers.

Male Champion of Change in the 2020 Women in Security Awards – noting that the office can no longer

Yet revelations that many employees want work-from-

be treated as the ipso facto best place to work for

home and hybrid working arrangements not because

everyone.

they are convenient or efficient – but because they feel safer at home – must be an eye-opener for every

“The office has to create the environment that actually

employee, in every business.

creates great collaboration, strong productivity, and great performance,” he explained.

“A fully on-site return to work is actually a risk to DEI,” Gartner warns. “The imperative is to facilitate

“We’ve got to make sure that leaders and managers of

flexibility while ensuring that all employees have an

business units understand what our employees want,

equal opportunity to participate.”

and appreciate and offer them that environment. You’ve got to understand each of your employees and

For all the talk about diversity, equity and inclusion

what makes them tick, and what works best for them

(DEI) in businesses, it will remain just talk unless

– and if you haven’t got that attitude, you’re really

companies can figure out who is being failed by

going to struggle.”

WOMEN IN SECURITY MAGAZINE

97


BEGOÑA ROMERO

THE SEARCH OF THE CRIMINOLOGY IN PRIVATE SECTOR IN SPAIN by Begoña Romero, Criminologist specialist in Corporate Security

Everything began when I was sixteen and read the

In 2010 I got lucky. The Bachelor’s Degree of

short story by Fredric Brown Don’t Look Behind You. It

Criminology was born, so I did not have to gain a

is the story of how a kindly man becomes a murderer,

degree before I could study criminology. However, I

influenced by the crimes of his so-called friends.

studied for two bachelor’s degrees simultaneously:

When I finished it, I started to ask myself “Why this

Law and Criminology. About halfway through my

transformation? How is it possible a kindly person

studies, I finally found the answer I was looking for.

could kill without regret and keep doing it?” While studying in Italy under the Erasmus+ program, In those years I was of an age to be making decisions

I decided I wanted an international career in

about my professional and academic future. I

criminology in the private sector. I also knew what I

decided to study for a career that could help me

did not want: to be a lawyer, or for law to be the focus

understand that change of mind. After long research

of my career. However, I did not want to neglect the

and listening to the advice of other people, I decided

skills the law degree had given me.

to study criminology. However, at the time there was no bachelor’s degree in criminology, it was a

I faced a significant barrier to achieving my aims. In

specialisation in other degree courses. I would first

Spain, criminology is undertaken in the public sector,

have to study law, psychology, medicine or social

not the private sector. None of my professors knew

work and then criminology. It would have taken me

how I could work in criminology except by becoming

almost six years of study to understand my Why.

a detective. I did not like the idea of being a detective. I wanted to live my own life, not the life of others.

98

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

In the year after my Erasmus+ study, I felt stuck because I could not see the way to achieving my career goals. After an unexpected encounter with a stranger, I saw the light. I told him about my frustration with trying to find a job in criminology and the current situation of the profession. He said to me “Go to Mexico, and maybe you will find what you are looking for.” I said to myself, “Why not?” So, I had a new target, discovering how criminology was applied in the private sector in Mexico. I saved money for two years and prepared everything to request another exchange through my university, Camilo Jose Cela University, with Anahuac’s University because it was the easiest way to get temporary residence, and if I wanted to work, it was the fastest way to get a labour certificate. That stranger was right. I found what I was looking for. I started work as a loss prevention specialist with Amazon. That job led me to investigate other aspects of criminology and their application in the private sector. My stay in Mexico over, I came back to Spain where I am spreading this knowledge and experience through my blog https://criminologiaempresarial.blog/. My search helped me discover aspects of security I could never have imagined, and I have helped other people understand how criminology can help to improve security and reduce the cost of investment in security.

www.linkedin.com/in/mbegonacriminology crimcorp@hotmail.com criminologiaempresarial.blog/ www.youtube.com/c/CriminologiaEmpresarial

WOMEN IN SECURITY MAGAZINE

99


TOP 5 TRENDS AND PREDICTIONS

for Australian boards and company directors managing cybersecurity risk in 2022 By Anna Leibel and Claire Pales, co-authors of The Secure Board Book and directors of The Secure Board advisory service.

BEING INSURED FOR A CYBER EVENT WILL BE CHALLENGING • Boards and leadership teams need to be aware that not all cyber insurance policies are made

cyber insurance policy, chances are the cyber event has taken hold of your business which could mean months of restoration and ongoing financial and reputational impacts.

equal and organisations must ensure they completely understand what they are covered

CHANGES TO LAWS WILL BECOME A REALITY

for. Exclusions/special conditions in the fine print aren’t always understood and can include

Critical Infrastructure Bill

ransomware co-payments or no payments,

With the Security Legislation Amendment (Critical

no coverage for out of support software and

Infrastructure Bill) 2020, currently under review in

hardware and little to no funding to repair

Federal Parliament, 2022 will provide clarity about

reputation damage.

what would trigger liability for company directors and

• Cyber insurance is not a cyber strategy – organisations and their boards who believe that

what would make the government intervene in an organisations cyber incident.

purchasing insurance are the only investment they need are putting their organisation at

For organisations in scope for the revised legislation

risk. Management must build the activation

and coming from a low base, prioritisation of

of their insurance into a robust, well-rehearsed

investment and allocation of resources will be critical

incident response plan that reflects how the

to achieving the compliance requirements.

organisation plans to respond in a crisis. This includes whether the cyber event can be quickly

The revisions to the act propose to hold company

contained through to an enterprise-wide system

directors in 2022 accountable for a cyber

shut down.

breach. This will require boards to understand

• Being prepared for a cyber incident is key. If you

the consequences of a cyber attack, contribute to

are in a position where you need to call on your

establishing a risk appetite for cybersecurity and prioritise funding and resourcing accordingly.

100

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

with the objective to be secure, not only achieve

WITH 91% OF CYBER INCIDENTS CAUSED BY A PHISHING EMAIL, THE HUMAN ELEMENT IS CRITICAL TO NOT OVERLOOK

compliance.

An organisation’s employees/partners/volunteers

The application of the Bill needs to be balanced with a broader, enterprise-wide cybersecurity strategy

are a critical asset in keeping the organisation safe. Ransomware Action Plan

Awareness is not enough and has failed to the extent

• The government’s new Ransomware Action Plan

that what we have been doing for more than a decade

proposes mandatory reporting by organisations

hasn’t worked. Communications in 2022 must involve

with a turnover of more than $10 million. The

influencing behaviours and getting staff to have a

reporting regime looks to better understand the

healthy sense of paranoia when working through their

ransomware threat and enable better support to

overflowing inbox.

victims of ransomware attacks. • Company directors and executives will need

High completion rates of annual compliance

to begin preparing for this action plan to come

training might seem like a good metric but it doesn’t

into effect and be clear on what it means to

guarantee staff will use that knowledge. What

their organisation, including the board’s role in

we want to see is action – a better metric is high

decision making and how they would be kept

reporting rates of phishing emails and spam.

informed in the event of an incident.

The risk of a third party causing a cyber breach

• Directors will need to ensure that there is an agreed position on ransomware payments at the

through phishing that has a flow on effect on business is very real.

Board level given the plan’s decisive stance on the payment of ransoms, making it clear this is

To be on the front foot, organisations need to ensure

not condoned.

a clear agreement with third parties on how cyber incidents will be handled, when you will be alerted to

WOMEN IN SECURITY MAGAZINE

101


an incident and what your rights are to ensure your data is protected. Examine how your contracts are set up if a contractor or third party causes a phishing risk to affect your organisation.

COMPANY DIRECTORS WILL BE HELD PERSONALLY LIABLE IN 2022 - THEY URGENTLY NEED TO UPLIFT THEIR UNDERSTANDING OF CYBER RISK • There is a growing trend for directors insurance,

BASED ON GLOBAL TRENDS, WE MUST BE PREPARED FOR A SIGNIFICANT CYBER ATTACK WITHIN AUSTRALIA • The sophistication and frequency of cyber attacks is on the rise – globally and locally and this will accelerate further in 2022. • Over the past 12 months, an increasing

but a key prerequisite is that the organisation also has a cyber insurance policy in place. Refer to #1 – insurance is becoming harder to come by. • The governance landscape is constantly evolving with new and challenging issues. The pandemic, increase in frequency, maturity and

number of Australian businesses have had

severity of cyber attacks and rise of high profile

their operations impacted by a cyber event:

sexual harassment complaints, are examples

JBS Meats, Eastern Health, my Budget. The

of the ongoing shift in the role of a company

increase in volume of cybercrime reported to

director.

the Australian Cyber Security Centre equates

• Company directors cannot gain confidence in

to one report of a cyber attack every 8 minutes

the cybersecurity protections of their business

compared to one every 10 minutes last financial

by undertaking a short course or by inviting

year.

an annual deep dive on cyber. Continuous

• More than half of the Australian businesses hit

learning is imperative to contend with new and

by ransomware attacks paid their attackers, but

challenging risks and issues. Education and

only a quarter of those actually got their data

development can be explored in informal and

returned in the past 12 months.

formal ways – from podcasts, articles, briefings,

• In 2022, all company directors must fully

workshops and training.

understand the consequences of a cyber attack on the organisation and management must have

www.linkedin.com/company/the-secure-board

plans in place to identify, contain and recover, and also outline the board’s role during an attack.

102

WOMEN IN SECURITY MAGAZINE

twitter.com/TheSecureBoard www.thesecureboard.com/


RYAN JANOSEVIC

MIKE BARBER

LAURA JIEW

CHOOSING TO CHALLENGE By Ryan Janosevic, co-founder and COO of Retrospect Labs, Mike Barber, CEO of the Australian Cyber Collaboration Centre (A3C) and Laura Jiew (AWSN)

Retrospect Labs, a start-up specialising in

Each team had a broad range of participants, with

cybersecurity exercises founded by former Australian

diverse cyber skillsets and a range of experience

Cyber Security Centre incident responders, partnered

levels. To reflect the make-up of real-world teams,

with the Australian Cyber Collaboration Centre (A3C)

some possessed greater working knowledge of

and the Australian Women in Security Network

incident response frameworks and methodologies

(AWSN) to provide the first ever competition-style

than others.

incident response exercise for women working in, or interested in breaking into, the information and

We were excited to offer an event like this exclusively

cybersecurity sector.

for females wanting to get hands-on incident response experience in Australia. The event ran for

This event kicked off on 8 December and

a week to give participants the time and space to

culminated in an event held at Stone & Chalk in

research and strategise.

the Lot Fourteen precinct where A3C is located, sponsored by Commonwealth Bank – on 15

The exercises in this incident response competition

December 2021.

included forensic artefacts, with participants playing the role of incident responders who had to analyse

Incident response in the context of information and

to understand what malicious activities had occurred

cybersecurity is not an easy domain. It is super

and how the adversaries undertook those activities

challenging. The adversaries who incident responders

i.e., their tactics, threats and procedures used.

deal with are usually highly motivated and highly skilled. A hands-on competition style event like this

“We’re pretty big on the importance of diversity

gave participants the opportunity to practice how

when it comes to our sector. We need diverse

they would respond to an incident before it happens.

people to bring their different skills to face the

WOMEN IN SECURITY MAGAZINE

103


threats. That’s why we focus not just on technical

compromise (IOCs), providing mitigation/remediation

skills, but also the socio-technical skills.

recommendations, and assisting media and/or legal teams.

“For example, working with the media team, talking to senior executives, or thinking about the

Throughout the competition, teams undertook certain

regulatory and compliance aspects of an incident.

tasks common to incident response activities, such as

We all know that information and cybersecurity can

briefings for senior executives, or answering technical

often be seen as the domain of a bunch of guys

questions related to the malicious activity that had

wearing hoodies doing their thing in a dark room.

occurred on the victim’s network.

“We want to smash that stereotype and help bridge

A panel of judges, each of whom is an expert in their

the gap between techies and non-techies, and build

field, evaluated the performance of each team, and

the level of understanding on both sides. We need

announced the winners - WrongEmail, UnderTheHood

a rich and diverse skillset of people to tackle the

and 0ddSocs - during a panel discussion at an event

challenges of information and cybersecurity. We

hosted at the A3C premises.

need them today and we’ll need more of them well into the future.”

“The Australian Cyber Collaboration Centre (A3C) is

- Ryan Janosevic, co-founder and COO of Retrospect Labs

pleased to be working with Retrospect Labs and the AWSN on this interesting and important challenge

104

As participants worked their way through these

as we progress our mission to support women in

scenarios, teams had to undertake standard incident

cyber security.”

response activities, such as identifying indicators of

- Mike Barber, CEO, A3C

WOMEN IN SECURITY MAGAZINE


I N D U S T R Y

P E R S P E C T I V E S

As most folks are aware, adversaries are constantly

www.retrospectlabs.com

coming up with new and devious ways to try and compromise networks. The need to stay on top and ahead of their tactics is why AWSN was happy to

AWSN

partner with the teams from Retrospect Labs and

www.linkedin.com/company/australian-women-insecurity-network-awsn/

A3C to enable this event, providing over 20 teams with the opportunity to get involved and turn theory

twitter.com/awsn_au

into practice in a hands-on way. Congratulations to the winning teams WrongEmail, UnderTheHood and 0ddSocs. Thank you also to CBA who came in as an

Laura Jiew

additional sponsor of the event.

www.linkedin.com/in/laurajiew/

We know diversity of thought processes is required to address the diversity of online threats. This is where our network thrives, by choosing to challenge.

A3C www.linkedin.com/company/a3cyber

Ryan www.linkedin.com/in/ryan-janosevic Retrospect Labs

twitter.com/A3Cyber

www.cybercollaboration.org.au/

www.linkedin.com/company/retrospectlabs

WOMEN IN SECURITY MAGAZINE

105


CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2

C O L U M N

Every CISO’s nightmare It’s 3:00 am and I hear my phone burst into life. I turn

right to help us recover from the inevitable 3:00 am

over to look at the number displayed on the screen:

call.

“SOC – Afterhours”. This can’t be good. I lean over and grab the phone off the charger and hit the green

I have said this many times, but you need to at least

button to accept the call. I take a breath and lift the

do the following.

phone to my ear. “Hello”.

• Ensure your backups work. Make sure they are running, make sure they restore and make sure

The next few moments are almost unbearable while

they are isolated from your primary network with

I wait for a response from the other end. Suddenly I

strongly controlled access to prevent them from

hear Jenny’s voice come over the speaker in a rushed,

getting encrypted by ransomware.

panicked tone. “We have been hacked. They have

• Do your security patching now. Get it tested and

access to everything. The entire system is encrypting

pushed out as soon as you can. Malicious actors

as we speak and we can’t stop it. It’s everywhere. It’s

will more than likely use old exploits for which

on everything. You need to come in.”

patches were issued months ago. Sometimes this isn’t the case, but prompt patching will help

The phone call drops off. She has hung up. Oh crap!

reduce your attack risks.

I always tell people it’s not if but when they will be

• Train your staff, and do it without all the jargon.

hacked. It looks like today is our day. I get up and

Teach them how to be better protected online,

head to the office. When I arrive there is chaos.

and ensure they all feel comfortable reaching

Everyone looks stressed and I can see a ransomware

out to ask for help when something happens.

message is displayed on all the monitors. I see Jenny

That last part alone could help reduce, or even

coming towards me. “The backups are all down.

prevent, a ransomware attack from becoming a

They haven’t worked in weeks. All the systems are

reality.

encrypted. We have nothing to restore from. What are we going to do?”

There is much more you need to do to keep systems safe and prevent your nightmare from coming to

I jolt awake, a bead of sweat across my forehead. My

reality, but don’t forget the basics. They are most

heart is pounding in my chest. I look over at the clock

important to minimise the likelihood of an incident

and it takes me a few moments to clear my thoughts

and ensure you survive when one occurs.

and realise that I was just dreaming. The nightmare

Do yourself a favour. Get your basics in order TODAY.

isn’t true, at least not today.

You can thank me later.

This is a nightmare many in the security industry would find terrifying. Some might find it exciting, but mostly it would be in the nightmare realm. Sadly, such a situation is becoming the new normal. It’s happening so often it is only a matter of time before it is your turn. Are we all prepared for this? NO, I don’t think most of us are. We have still not got the basics

106

WOMEN IN SECURITY MAGAZINE

www.linkedin.com/in/craig-ford-cybersecurity www.amazon.com/Craig-Ford/e/B07XNMMV8R www.facebook.com/pg/AHackerIam/ twitter.com/CraigFord_Cyber


F E AT U R E

I CHOOSE TO CHALLENGE... MENTORS TO STEP UP by David Braue

W

omen in Australia’s STEM

This will come as little surprise to many women

industries have a real

in cybersecurity, where the pandemic’s disruption

problem. Despite years of

has fragmented whatever support networks were

supposed progress towards

available in the past.

gender equality, a recent Professionals Australia review

Just 17.8 percent of women responding to the

found that women across the STEM workforce are

Professionals Australia survey said they had engaged

still underpaid, underrepresented, and unsupported.

in formal mentoring activities over the previous 12 months, with 38.4 percent confirming they had

Women represent only 29 percent of the university-

engaged in informal mentoring – something that

qualified STEM workforce and 13 percent of

often took place after hours and was difficult to

executives in STEM industries, the report Women

access due to their other commitments.

Staying in the STEM Workforce, found, and face a pay gap of 22 percent compared with their male

“Having no senior women as role models and

colleagues.

mentors makes it harder to map out a career path and gain the networks required for advancement,”

With women affected more severely by the COVID-19

said one respondent.

pandemic than men, Professionals Australia CEO Jill McCabe warned of a looming surge in attrition of

“Lack of mentors and a network to call upon has cast

women and called for “urgent organisational changes

me adrift,” agreed another, “especially now when I

to ensure the retention of women in STEM fields.”

want to get back into the workforce.”

“Being part-time cuts you off from a lot of

YOU CAN’T SEE WHAT YOU CAN’T SEE

progression opportunities,” she continued. “This

It’s not 1985 anymore. With women actively

creates a vicious cycle where fewer women make it

participating in cyber and other STEM industries

into senior, hiring positions and, as a results, fewer

that are desperate to engage skilled professionals,

women in the workforce have access to professional

widespread reports of a chronic lack of mentorship

development or are promoted to more senior roles.”

are simply embarrassing.

WOMEN IN SECURITY MAGAZINE

107


make it difficult for underrepresented talent to ascend to more senior positions.” Hybrid work environments can boost inclusion by 24 percent if they’re managed properly, Gartner notes. “Inclusion may be compromised in a hybrid work environment due to lack of visibility,” explained Ingrid Laman, vice president of advisory within Gartner’s HR practice. “In a hybrid work environment, unfair treatment may go unchecked as employees have less visibility into how others are treated; trust can erode Fully 51.7 percent of survey respondents said the lack

due to a lack of transparency.”

of networks had significantly or moderately impacted their career advancement, with many lamenting the

Gartner recommends firms address this lack of

lack of access to “everyday hallway discussions” and

visibility with four key initiatives including training

“very limited social interaction with colleagues” due to

employees to identify and address ‘microaggressions’

a lack of female peers.

– “verbal, behavioural or environmental indignities that insult traditionally marginalised groups” as well

Now more than ever, women and other marginalised

as financial and physical well-being programs and

groups need your support and guidance as they work

better reporting on diversity metrics.

to figure out how to resume or redirect their career progression in the wake of the pandemic’s massive

The fourth critical action is to support diversity

disruption.

mentorship programs, through which employers can provide a “viable networking infrastructure that

“Lack of consultation on a directed career path

enables underrepresented talent to build growth-

became a barrier when seeking other opportunities

focused networks”.

within the business,” one respondent said, “as it was deemed I was fixed along a particular pathway which

“At the office it’s easy to introduce yourself to a senior

I had little knowledge and no buy-in.”

colleague when you bump into them,” said Laman, “but in the hybrid world, organisations must ease the

“This had been agreed by others as a succession

effort required to participate in networking programs

plan which I had no part or agreement in. I was also

and help facilitate connections.”

advised to avoid making application for roles due to my lack of experience.”

BE THE DIFFERENCE YOU WANT TO SEE Formal mentorship support can make all the

Lack of mentorship and guidance is having a

difference for women who are struggling to get on the

corrosive effect on women’s long-term career

same footing as their male colleagues.

planning and sense of self – and the even bigger problem is that the issue is so very easy to fix. All you

“I don’t think people understand how difficult it is for a

have to do is take the initiative to reach out, and let

female to build the same support networks as it is for

talented women know they are not alone.

a male,” Toni McAllister, founder of Women in AV, told a recent panel at the ASIAL Security + Integrate 2021

Lack of visibility is a chronic problem,with Gartner

conference.

recently noting that “the most pervasive challenges

108

to increasing diversity are organisational in nature....

“That’s where women need to champion each other

Lack of transparency on career paths, next steps

as well, and make sure that we’re providing that

to promotion and lack of mentors/ careers support

support,” she continued. “For me, having a really good

WOMEN IN SECURITY MAGAZINE


F E AT U R E

male and female mentor gives you that balance, and

“People’s expectations of me, based on either their

the ability to build the networks. You just can’t do it in

experiences or what they would think my experience

isolation either way.”

should be, were the theme that I was just fighting. I wanted more responsibility, but I wasn’t necessarily

Some women are finding formal programs invaluable

given the space to grow. I got a lot more work, btu I

in focusing otherwise vague commitments to improve

made my boss look really good.”

mentorship and engagement. “Luckily, I had some amazing sponsors and mentors Programs like STEM Returners Australia have helped

who made sure my place was full, then hit me up to

support women’s efforts to relaunch their careers,

this next level. But it was not a smooth process for

while internal efforts like the Amazon Web Services

the first half of my career.”

She Builds program have proven to be an important source of motivation and support as the company

Here are a few ways you can support a culture of

pushes towards gender parity.

inclusion, to ensure that women don’t fall through the cracks.

Formal mentorship programs can be a lifeline for women who know how soul-defeating it can be to be

• Address inequality in the workplace

working hard without recognition or support – and

• Educate all about security and provide further

it provide crucial support for employees who are increasingly being hired based on their capabilities and potential.

upskilling programs • Listen to people’s experiences, implement processes with purpose, and regularly inspect metrics and decisions to ensure they are fair and

Fully 82 percent of Australian employers have hired candidates who did not met all the technical

equitable. • Support talent in senior roles or male-dominated

requirements for the role, according to a recent

teams. It is not enough to simply appoint a

Robert Half study that found 43 percent of those hires

woman to a senior role in a traditionally male-

reached their full potential as quickly as an employee

dominated organisation or in a male-dominated

who held all the technical requirements of the role.

part of the business and let her ‘sink or swim’. • If you want women to thrive and succeed –

The key to progression, then, is not only having

especially in traditionally male-dominated areas

the skills – but having the organisational support

– you need to elevate the unique capabilities that

and encouragement for women to reach their full

they bring to your teams and create a cohort of

potential, free of the arbitrary and difficult obstacles

diversity.

they have faced in the past.

• Personally and visibly sponsor women both within and outside the business

With the right support, anything is possible – but even today’s senior executives have been there too.

• Personally back senior women to succeed by providing ongoing support and sponsorship into their next role and actively responding to

“In the early part of my career, I would get stellar reviews,” recalls Merrie Williamson, a 20-year Microsoft veteran who now manages a multi-billion dollar revenue line as corporate vice president of Azure Infra.

backlash • Host or sponsor connection sessions with men and women on parental or other forms of longterm leave • Make succession planning transparent with checks in place to ensure diverse candidates are

“I had this very interesting balance of ‘you’ve done great and you are a high performer, but not yet...

considered. • Ensure the organisation is tapping into diverse

you might be too ambitious,” she said during a panel

referrals and networks; discourage ‘referral

session at the company’s recent Ignite conference.

culture’ that just results in ‘more of the same’.

WOMEN IN SECURITY MAGAZINE

109


TECHNOLOGY PERSPECTIVES


LUKE ZILLMAN

CYBER SECURITY GOVERNANCE, RISK AND COMPLIANCE AND THE ART OF WAR by Luke Zillman, Manager, Information Security, B.IT(DC,IS), GradCert IT(IS), MCSE, CISA, CISM, CISSP, ISO 27001 LA

It was the December 2019 Christmas holidays. As

the Australian Signals Directorate’s Essential Eight

I lay in my backyard hammock on a warm summer

strategies to mitigate cybersecurity incidents.

evening, I took the time to look back over the previous 18 months, working as an information security

I have always read for relaxation. So, as I lay there, I

manager for a large organisation. I reflected on how

picked up the book I was reading, which happened to

proud I was, and on the sense of achievement our

be Sun Tzu’s The Art of War. Sun Tzu was a Chinese

team had experienced with the work undertaken. I

general, military strategist, writer and philosopher

also acknowledged the large body of work that lay

who lived around 500 BC. The Art of War is an

ahead of us to get where we needed to be.

influential work of military strategy that has been read for hundreds of years by just about every military

In mid-2018 the government brought in sweeping

strategist worth their salt.

changes to the way we were required to manage cybersecurity. By early 2019 we were in the process

As I continued reading, I read a quote that instantly

of planning and operationalising an information

resonated with me: “If you know the enemy and know

security management system (ISMS) that conformed

yourself, you need not fear the result of a hundred

to the requirements of both ISO/IEC27001:2013 and

battles. If you know yourself but not the enemy, for

WOMEN IN SECURITY MAGAZINE

111


every victory gained, you will also suffer a defeat. If

Continuing to channel the advice of Sun Tzu I asked

you know neither the enemy nor yourself, you will

myself:

succumb in every battle.” The idea of applying this concept to cybersecurity

HOW DO ORGANISATIONS TRULY KNOW THEIR ENEMIES?

intrigued me. I went back inside the house and

Understanding the cybersecurity threat landscape

grabbed a notepad and pen (I am old school), and

is crucial to understanding who (or what) might

started jotting down questions and ideas as follows:

intentionally or unintentionally target your organisation. Examples include nation states, cyber

HOW DO ORGANISATIONS TRULY KNOW THEMSELVES?

criminals, hacktivists, script kiddies, accidents and natural disasters.

Having worked in cybersecurity for 15+ years, I understood the importance of having a modern and

Modern and robust cybersecurity threat and risk

robust cybersecurity governance structure. Having

management processes are required to identify

a cybersecurity governance committee is essential

the likelihood of an adversary or natural disaster

to governing and protecting large and medium-sized

impacting the confidentiality, integrity, or availability

organisations (including government agencies) from

of one or more organisational systems, the efficacy of

adversaries. Back in my hammock, I once more put

the control environment in place, and the impact on

pen to paper and set about drafting modifications to

the business if the risk were to eventuate. Establishing

my organisation’s cybersecurity governance structure

such processes was exactly what we did.

to further strengthen and enhance it. In 2020 we mapped out and operationalised new Cybersecurity has touchpoints in just about every area

processes to identify and security-classify our

of an organisation, so it is critical the committee’s

systems and our control environment, and we

membership reflects the organisation’s diversity.

undertook detailed information security risk analysis of our core infrastructure and systems.

As an example, the committee might include

One final question remained unanswered:

executive members such as the CEO, CIO, CISO, (to name just a few). Information security roles

HOW DO ORGANISATIONS TRULY KNOW THEMSELVES AND THEIR SUPPLIERS?

and responsibilities need to be clearly defined

It was now a Sunday afternoon in January 2021.

and understood by each committee member.

A little over a year since my initial reflection in the

The committee will generally be responsible for

hammock, and just over two years since we started

determining the organisation’s risk appetite and

our ISMS journey. The Christmas holidays were once

tolerance levels, monitoring cybersecurity risks,

again coming to an end, and I was due to return to

establishing asset identification and classification

work the following day.

CFO, COO, CHRO, CPO, and corporate legal counsel

processes, and for ensuring organisational-wide information security policies, standards and similar

As an organisation we had undertaken a lot of work

artifacts are in place.

over the previous couple of years to really strengthen and modernise our cybersecurity governance, risk and

Governance is the foundation of any organisation’s

compliance functions, and I knew our cybersecurity

cybersecurity program. Without it, you won’t

controls and processes needed to extend to our

truly know yourself, including your organisation’s

suppliers.

information assets and the systems that need protecting, or the controls that are (or should) be in

Our suppliers are arguably an extension of our

place to protect them.

organisation because they transact much of our classified information and data. Cybersecurity

112

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

management of its supply chain is a key focus area

of turning ideas into action not only exists but is

for many organisations, and our organisation was no

applauded.

different. Had I not worked in such an environment, all my I started to think of ways to strengthen our

ideas and concepts would have remained just that –

organisation’s supply chain. I knew we already

ideas and concepts. I am very fortunate to experience

included information security requirements in our

fantastic support and encouragement from my

supplier agreements, but implementing these is

immediate team and senior executive team. Without

a time-consuming exercise for everyone involved,

their championing of all that is required to operate a

including information security, procurement and

successful ISMS, we as an organisation would not

project management teams. To solve this I came up with the idea/concept of the Cyber Security Conditions Catalogue (CSCC). The CSCC is a tool to generate information security requirements that can be included in contracts, invitations-to-offer and similar agreements between our organisation and our suppliers. The information security requirements are filtered

I read a quote that instantly resonated with me: “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained, you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

based on the commensurate information security classification of the information or system being procured. The CSCC provides the

have been able to go from strength to strength and

organisation with greater assurance that appropriate

progressively mature our cybersecurity defences.

security provisions are included in supplier agreements, provides consistent and standardised

So, as another year passes and I look forward to my

contract terminology to key stakeholders, and

upcoming Christmas break, I will be enjoying some

reduces the time spent on repetitive tasks.

relaxation time in my hammock and my mind will no doubt again wander to what the future will bring and

The CSCC has now been implemented, initially as a

what opportunities will present themselves in 2022. I

proof of concept, and has generated considerable

can’t wait.

interest across both our organisation and public and private sectors as a high value, easy-to-use tool that has great potential to both improve security posture and reduce time and effort. One of the key differences between implementing a successful ISMS or experiencing failure is having executive support and backing. I am extremely fortunate to work within a progressive and supportive organisation where innovation and the opportunity

WOMEN IN SECURITY MAGAZINE

113


I CHOOSE TO CHALLENGE... CHAMPIONS WHO AREN’T REALLY CHAMPIONING by David Braue

W

hen it comes to promoting

Fully 30 percent say that DEI isn’t really their

the cause of women in

responsibility – and 26 percent actually had the

security, there are champions

temerity to argue that men and women aren’t support

and there are champions.

to be equal.

But based on one recent report about Australian men’s

Within the context of these rather disappointing

attitudes towards diversity, equity and inclusion (DEI),

results, 61 percent of surveyed men said that while

you can consider yourself lucky if you’re supported by

they work hard to meet targets for women’s career

either type.

advancement, they do it primarily because they are obligated to – rather than any strong personal

Although 61 percent of men told The Dream

convictions.

Collective’s recent survey that they are willing to engage around DEI issues, fully 48 percent said

These figures don’t really offer the kind of resounding

they feel fatigued by the DEI discussion – and 52

support that one would hope for after years in which

percent believe that a focus on DEI has led to reverse

women have been struggling for equal recognition.

discrimination. Neither were the responses gauging interest in DEI

114

Around 45 percent of men believe that men and

training: just 12 percent of men said they were willing

women are already treated equally – and that if

to lead the charge towards such training and 25

women fall behind, the problem may be due to

percent were willing to be first movers in driving such

women’s lack of drive or motivation.

an initiative.

WOMEN IN SECURITY MAGAZINE


F E AT U R E

Fully 13 per cent of top managers were classified as ‘rejectors’ who would offer little support for DEI initiatives, while just 48 percent of respondents said they would participate in GEI training because they would be greatly motivated to support their female colleagues. The results are a blow to women’s expectations that they can rely on the men they work with to be enthusiastic champions of diversity – and they’re pushing analysts to recommend that business leaders take a firmer hand than they have in the past. Indeed, a recent Gartner survey of more than 200 HR leaders found, 36 percent reported problems holding business leaders accountable for DEI outcomes. And while many leaders are doing the right thing by championing the cause of diversity, 1 in 3 are still failing to promote the cause in a meaningful enough way to positively influence corporate culture. The progression of underrepresented talent, Gartner noted, stalls in mid-level and senior positions “as these employees experience slower rates of promotion and worse perception of leadership potential”. Given the results of The Dream Collective’s survey, this is hardly a surprise. So much for relying on the goodwill of diversity champions.

PUSHING BACK AGAINST APATHY If leaders can’t necessarily be trusted to promote the cause due to their own personal convictions, Gartner recommends an alternative approach called consequential accountability – based on driving equitable talent decisions, enabling leaders to execute DEI goals, and requiring leaders to demonstrate progress against DEI goals before they can advance within the organisation. It’s a bold change of strategy that will, the firm believes, make still predominately-male leaders sit

WOMEN IN SECURITY MAGAZINE

115


up and take notice if efforts to champion DEI are

“Allyship is a huge part of how we’re going to

spinning their wheels.

advance and solve these gaps and have these tough conversations,” she said. “I know a lot of people want

Their support, Nutanix director of corporate social

to be allies, and they want to help out – and there’s

responsibility and DEI Caity Curtis noted during a

always that piece that holds people back.

recent webinar, is essential to drive real change. “They don’t want to say the wrong thing, or they don’t know the right way to champion someone on their team who deserves this but may be an introvert.” Progressive action is crucial to encouraging champions to make a real difference – and to putting weight behind women’s not-unreasonable expectation that the men they work with will support their right to equal treatment. “Despite all of the DEI programs and initiatives that you put in place, progress is still coming down to the day to day activities of your IT leaders and your direct reports,” notes LJ Justice, principal for pride research with Gartner. “We’re expecting them to be our stewards and champions of an inclusive culture,” they continued. “We’re finding that when IT leaders actually do want to engage in DEI efforts on their own time, they’re coming up against so many other competing priorities and time pressures.” “That’s why simply seeing the numbers doesn’t create the personal ownership that we need – especially if leaders aren’t being held individually responsible.”

“Allyship is a huge part of how we’re going to advance and solve these gaps and have these tough conversations. I know a lot of people want to be allies, and they want to help out – and there’s always that piece that holds people back. They don’t want to say the wrong thing, or they don’t know the right way to champion someone on their team who deserves this but may be an introvert.””. - Caity Curtis , Nutanix director of corporate social responsibility and DEI

116

WOMEN IN SECURITY MAGAZINE


F E AT U R E

EATING THE BREAKFAST OF CHAMPIONS

“It is as important to ensure that you maintain that

Ultimately, the cause of championing women’s

diversity and that you maintain those really good skills

advancement and recognition may benefit from the

in the people you bring into the team.”

broader discussion around executives’ increased obligations around cybersecurity as a corporate

“You’ve got to make sure you have the right plans as

target.

well as the right support structure in place to ensure that they can get that.”

If male leaders promote and champion the capabilities of women in the same breath as their conversations around cybersecurity risk, NBN Co chief security officer Darren Kane noted during a recent AISA Cyber Australia 2021 panel session, the increasing awareness may reinforce the importance

HERE ARE SOME TIPS FOR FOSTERING CHAMPIONS – AND DEI ACCOUNTABILITY: • Change your recruitment, policies, systems that will ensure a broad talent pool is considered in every recruitment or promotion decision.

of DEI.

• Implement opportunities for job shares, parental

“Security risk is one of the most senior business

• Provide a safe & inclusive environment

operational risks any organisation, agency,

• Aim for the 50:50 rule to help uncover systemic

leave or both men and women

government department or small business will

and entrenched bosses in policies and

face,” Kane explained, “and to actually have your

processes. And the best ratio is 40% women and

security workforce hidden away and only have one

40% men, with 20% open, will also deliver real

spokesperson, or a communications full of acronyms

benefits.

that very little people understand, is a problem.”

• Make sure within your organisations board there

“We’ve actually got to stop promoting that image,” he

• Increase the diversity in your executive teams to

is at least one woman if not more. continued. “We’ve got to be up front and help people understand that what we’re dealing with here in this

increase the representation from within. • Be transparent when it comes to systemic biases

industry is a significant issue that takes a senior

and regularly review. Transparency is key. It

business executive in the organisation, to manage

builds confidence in our employees and it helps

and to communicate to the C suite.”

to hold everyone to account for the delivery. • Support all employees to succeed, particularly

If there’s anything that will motivate male leaders

when they may be a minority in their new team.

apathetic to the actual cause of DEI, it’s the potential

This includes ensuring readiness for new team

for censure by their senior managers.

members who are outside the status quo. • Champion succession planning as a key

For this reason, stronger senior-level support and will inevitably trickle down whether those indifferent managers are enthusiastic champions or begrudging accomplices.

management priority • Challenge your team to rewrite job descriptions regularly and ‘de-construct’ requirements • Ask line managers what they have done to identify a pool of candidates that is gender

“It’s really about focusing on what the goal is and what the aim is,” said Eshan Dissayanake, head of digital security with Coles Group, who recruited nearly 15 people into his team last year and achieved a

balanced, including where they have looked and who they have encouraged to apply • Challenge decisions that are inconsistent with building a diverse team

gender diversity of more than 50 percent.

• Establish expectations for top teams to visibly

“There’s one thing about attracting diversity into your

• Don’t just fill the quota for the sake of it.

sponsor women into their next roles organisation and then into your team,” he added.

WOMEN IN SECURITY MAGAZINE

117


MARISE ALPHONSO

THE LINK BETWEEN CORPORATE GOVERNANCE AND EFFECTIVE SECURITY GOVERNANCE by Marise Alphonso, Information Security Lead at Infoxchange

Security governance has increasingly become a

The pervasiveness of ‘cyber’ in practically every

necessary component of , the mechanism that forms

organisation’s business processes requires the

the basis for the operations of an organisation.

organisation to review how the ‘information/cyber security’ interface is managed.

It includes the need for senior stakeholders to evaluate, direct and monitor the performance of

This can be achieved by the establishment

an organisation. One of the key components of

and implementation of an Information Security

corporate governance is risk management.

Management Framework (ISMF). The ISMF consists of policies, standards and practices that, at a high

It requires an organisation to assess and treat

level, include requirements for meeting the needs

risks posed to the operations of the organisation

and expectations of stakeholders and facilitating

in the context of its internal and external operating

operational performance of the organisation.

environment. In practice the ISMF might call for security to be Information security management activities and

embedded in business processes improvements,

practices within an organisation are based on the

for risks to be optimally managed, for internal and

need to manage information and cybersecurity risks

external compliance obligations to be met, and for

to acceptable levels.

a security culture to be reflected in the values and behaviours of employees.

118

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

The requirements stated above are broad and can

— depending upon the processes and technology in

be extensive depending upon the organisation’s

place.

operating environment. As with any aspect of corporate governance, the key elements to ensure

Learning and development are foundational for

the successful implementation, operation and

continuous improvement of security practices and

maintenance of information security practices

can contribute positively to security culture. Initiatives

outlined in the framework are organisational

could include: learning how shifts in the threat

leadership, change management, communication,

landscape can impact the organisation; exploring

learning and development, and measurement.

new technologies or automation processes that could be leveraged; undertaking post-incident reviews to

Leadership in the information security space is an

understand what should be implemented to prevent

interesting topic of discussion and one where top-

future incidents of a similar type.

down and bottom-up leadership approaches are required to improve information security practices.

Measurement and metrics are important to understand whether the ISMF is creating value for

‘Security is everyone’s responsibility’ is a mantra often

the organisation. Understanding the expectations of

used to reinforce the message that all employees in

internal and external stakeholders will help to define

an organisation have a role to play, whether they be

the elements of the framework that are important to

governance committee members participating in a

measure. For example, answering the questions “How

risk management discussion and deciding how risks

many data breaches have resulted in the unauthorised

are to be treated or employees reporting a security

access of customer information?” or “What

incident.

percentage of findings from the last penetration test of a key application were rated as ‘high’?” would

Employees throughout the organisation should feel

provide an indication of the effectiveness of the

empowered to uphold security practices with specific

security measures in place, and whether they limit risk

roles and responsibilities laid out in the ISMF.

to an acceptable level.

Change management and communication are

Aligning these elements in a plan-do-check-act

essential, to ensure security practices are sustained,

cycle will support an organisation’s information/

internal and external stakeholders understand the

cybersecurity practices, ensure effective security

organisation’s stance on information/cyber security

governance and achievement of an organisation’s

practices, and there is clarity on expectations. Various

objectives.

communication formats and media can be used — for example, an intranet post or monthly newsletter email

www.linkedin.com/in/marise-alphonso/

WOMEN IN SECURITY MAGAZINE

119


JACQULINE JAYNE

DO YOUR PART. #BECYBERSMART. by Jacqueline Jayne, Security Awareness Advocate - APAC, KnowBe4

A QUICK RECAP FROM PART ONE IN THE PREVIOUS EDITION OF AUSTRALIAN WOMEN IN SECURITY MAGAZINE WHERE I ENDED WITH: “Over the years, I have seen the a-ha moments occur when there is a realisation of how educating your people is just as important as securing your infrastructure, systems, and networks”.

WHAT CAN YOU DO TO START THE CONVERSATION?

Throughout this process, you will need to have many

If you are in IT, then create a team with people

outcome will be.

conversations, and the more you have, the better the

from other areas of the organisation to talk about cybersecurity. The same goes for those of you who aren’t in IT. The greatest success will come from cross collaboration and top-down support. Discuss

OBSERVATIONS • Training people on cybersecurity once a year will not work

how cybersecurity relates to the entire organisation

• Changing behaviour takes time and effort

and prepare and plan to make a difference.”

• Knowledge or awareness is no longer enough • There is a need to make cybersecurity personal

As promised in part one, I will share in this article a real-life example of how to build a successful cybersecurity education and awareness program.

a culture of cybersecurity to develop • Changing behaviour is akin to integrity, where

The following information is not designed as a

people do the right thing even though no one is

one-size-fits-all model, rather an outline of things to

watching

consider. However, I can tell you that it does work.

120

to everyone for any real change to occur and for

WOMEN IN SECURITY MAGAZINE


T E C H N O L O G Y

P E R S P E C T I V E S

PROGRAM DEVELOPMENT

someone in IT to create a communications plan, or to

In many instances, a program such as this starts

expect someone in HR to understand the cyberthreat

off with a board directive or identified need to ‘do

landscape.

something’ to upskill employees in cybersecurity. Whilst the preparation is multi-tiered, the result is

HR (generally) will have created a business partnering

a robust framework for a successful cybersecurity

relationship with business units and have a clear view

education and awareness program.

of the culture of the business. Change Management principals are also required, and these traditionally sit

Remember, training people once a year will not

within HR.

work. The goal is to create a human firewall with your people ready for battle and armed with the

IT (generally) has a lot of knowledge of the cyber

appropriate tools and knowledge to protect your

space, the technical jargon and the compliance

organisation from cyberattacks.

requirements. IT employees get frustrated and don’t quite ‘get it’ when people continue to click on

Your people are your last line of defence, and creating

malicious links in emails and fall for scams.

human firewalls takes time.

STEP 1: RESEARCH AND PREPARATION In step one below, research and preparation will

Create a program team that compromises one person

require time (one-three months) with considerable

from HR such as from Learning and Development

stakeholder engagement and collaboration.

or Organisational Development - to take the lead, an Executive sponsor, and someone from IT with subject

The end goal is to obtain (if applicable) Board and

matter expertise on the subject.

Executive sign off. Step one should be treated as a project and Without an agreement to the plan, the program will

transitioned to business as usual after launch which

not succeed.

will require a minimum of one dedicated employee to provide the ongoing management that it requires.

WHO SHOULD PARTICIPATE IN A CYBERSECURITY EDUCATION AND AWARENESS PROGRAM? A successful program requires people from HR and IT working together. It is unreasonable to expect

PROGRAM PREPARATION Start by asking yourself these questions • What is the program intent? (Change or create a culture of cybersecurity awareness, reduce risk,

WOMEN IN SECURITY MAGAZINE

121


lift the cyber knowledge of our people etc.) • What are the program’s objectives? (Educate, change the culture, stop people clicking, comply

tailgating, dumpster diving etc. - Reporting monthly with previous monthly training and SSE results

with regulatory requirements, etc.) • What are the program’s measures? (Observable

Then, consider these program elements:

behaviour, simulated phishing reports, audits, completed training, assessments, etc.) • What are the key messages? (Cybersecurity

• Research best practice for a cybersecurity training and simulated social engineering

is everyone’s responsibility, our patients need

platforms to underpin your program.

you to keep them cyber safe, we protect your

• Develop a timeline for your program

personal information – help us keep our

(Demonstrate all the steps involved and highlight

networks and systems safe, etc.)

milestones linked to measurements for success)

• How will you know your program has worked?

• Engage other business units such as Marketing

(Measurements such as increased knowledge, a

and Communications to ensure the program

reduction of people clicking simulated phishing

complies with requirements (Look and feel,

emails, people are demonstrating they care

design a logo, phrases, imagery, position

about protecting our data, etc.) • How will you align your business strategy, risk

statement, etc.) • Plan for baseline activities such as simulated

policies, and related compliance and regulatory

phishing exercises, cybersecurity knowledge

requirements? (PCI-DSS, GDPR, etc.)

checks and security culture and behaviour

• What kind of reports will you prepare, how often, and why are you providing the data? • What impact will a program like this have on your organisation resources and what time commitments will it require? • Will there be a need for budgetary items?

measures. • Create a communication plan (Type, frequency, intent, content, templates, emails, reporting, intranet, visual aids, etc.) • Define what the ongoing training and education content will be (Engaging and relevant videos,

(Resourcing, licensing costs, marketing

eLearning, posters, infographics, games,

engagement materials, target free time for

informal F2F sessions throughout the year, etc.)

training, rostering needs, etc.) • What does a month look like for employees? For example: - Monthly Training – between 5 and 15 minutes - Ongoing simulated social engineering (SSE) – phishing, smishing, vishing, USB,

122

WOMEN IN SECURITY MAGAZINE

WHAT ABOUT THE PEOPLE? • What are the expectations for employees? (Compulsory monthly training, reporting of suspicious emails, participation with simulated social engineering, observable change in behaviours, etc.)


T E C H N O L O G Y

• What are leaders’ and managers’ expectations

P E R S P E C T I V E S

STEP 2: PROGRAM SIGN OFF

(Leading by example, supporting the program,

Once you have compiled all the above, it’s time to

etc.

present your plan to the executive team for discussion

• What will be the roles and responsibilities in the organisation related to cybersecurity? (This

and sign-off. Their support and buy-in are critical to the program’s success.

assists with identifying low, medium and highrisk roles when it comes to cybersecurity) • Will you include any elements of the program

You are now ready to launch your program. NB: Without this step, your program is doomed to fail.

into existing key performance indicators for performance reviews? (Such as training

STEP 3: LAUNCH THE PROGRAM

completion for individuals and an overall

Yep – launch the program!

decrease when it comes to engaging with simulated phishing emails, etc) • Will you add a cybersecurity education module for your new starters?

STEP 4: MANAGE THE ONGOING PROGRAM The success of a program such as this for an organisation relies on ongoing management and, in an ideal world, a full-time employee with skills in

ENGAGEMENT (ACTIVITIES TO SUPPORT AWARENESS) • Implement a formal team of Cybersecurity Safety

stakeholder management, learning and development, communication and change management as well as support of one or two cyber people from IT to

Officers (CSSOs). Think along the lines of first

serve as a subject matter expert. This is, of course,

aid officers, Work Health Safety Representatives,

dependant on the size of your organisation.

Mental Health Officer etc.) • Engaging people in a subject such as

STILL HERE?

cybersecurity is not easy. Identifying the WIIFT

Congratulations if you are still reading. There is

(What’s-In-It-For-Them) for your employees will

indeed a lot of information to digest, and if you

increase the chances of a successful program.

are still with me, you are taking the education and

(Link your program to personal activities outside

awareness of those in your organisation seriously.

of work, family, kids, travel, the elderly, etc.) • Develop a rewards scheme for observable

Whether you are at the beginning of your journey or in

behaviour change (gamification, leader boards,

the middle of your program, I am always here to help

awards, make it fun, etc.)

and welcome the opportunity to discuss it with you.

OTHER CONSIDERATIONS

Until then, #BeCyberSmart.

• Never punish human error (Use it as a learning opportunity).

www.linkedin.com/in/jacquelinejayne/

• Develop a cyber-related newsletter or page on your intranet.

clubhub.site/@jacquelinejayne

• Provide useful tools for employees to share with their families.

jacquelinej@knowbe4.com

• Demonstrate live hacks so the ‘a-ha’ moment takes place.

twitter.com/JakkiJayne

• Provide full transparency on any near misses or actual cyber-attacks on the organisation. • Look at the data you hold and understand and communicate its real value. • Focus on the data you have on each employee: when they realise it is not only customers data at risk their level of care increases.

WOMEN IN SECURITY MAGAZINE

123


Women in Leadership Program

WE UNDERSTAND THAT LEADERS COME FROM VARIOUS BACKGROUNDS

THE AWSN WOMEN IN LEADERSHIP PROGRAM HAS SOMETHING FOR EVERYONE - NO MATTER WHERE YOU ARE IN YOUR LEADERSHIP JOURNEY

Applications are now open for our 2022 Women in Leadership Programs for:

Emerging Leaders Aspiring Senior Leaders Aspiring Global Leaders Leaders wanting to increase their technical knowledge Leaders wanting to increase the impact of their presenting

Sponsored by

To find out more, visit: https://www.awsn.org.au/initiatives/women-in-leadership/


STUDENT IN SECURITY SPOTLIGHT


Ritu Dahiya obtained a masters in cybersecurity from La Trobe University in 2020. She grew up in India where she obtained a master’s in computer applications from the Maharshi Dayanand University in Haryana, and is now learning cloud computing by pursuing AWS certifications. She is already an AWS Certified Cloud Practitioner.

RITU DAHIYA

Founder, Cyber Manch | Ambassador, ISACA She Leads Tech | Cybersecurity Graduate, La Trobe University

What subject(s) do you find most interesting and/or likely to be most useful?

What does your ideal workplace entail?

The subjects of most interest to me are:

diversity, believes in gender equality, is flexible,

Digital forensics and cyber law These helped me to

and offers equal opportunity. I would also like the

audit several devices and generate reports. This may

opportunity to do volunteering alongside my job,

be because I very much like crime series such as

because I believe what I receive (help, support,

NCIS and Special Law Force.

resources, opportunities) should be passed on to

Incident and crisis management I am a public

others who need it. I would love to see what is being

speaker and love to learn how to deal with a cyber-

done to make a change. I want to keep my passion for

attacks, handling the incident and saving the

spreading awareness and promoting women in STEM

reputation of the organisation. It is very important

throughout my journey.

My ideal workplace would be one that respects

to have proper knowledge of risk management acknowledgement.

Do you have any advice for current or future security students?

Project management I have learnt several

Yes, I would highly recommend students to connect

methodologies for handling a project. Implementing

with relevant organisations that can help them grow

these in my personal life helps me manage my time

in their career.

across my many commitments. Project management

Networking Everyone says networking is important,

helps me achieve my goals and meet deadlines, and

and that’s so true. Networking can help you get advice

adds more skills to my profile.

from professionals. You can have greater awareness

and to handle the situation calmly with proper

of potential job opportunities and resources, and find

What aspect of cybersecurity do you think you would like to focus on after graduating? (or) are there further security qualifications you are thinking of pursuing?

mentors and role models who are more than happy to

I want to start my career as a cybersecurity analyst in

because these enable you to find resources, training

the risk and compliance domain. I am learning cloud

and potential opportunities at the right time. It is no

computing with AWS certifications and planning to

secret the internet is overflowing with free learning

become a CISM. There is much more I want to learn,

resources and options for training that can add good

and more certifications I want to gain, but I want to

skills to your profile.

help and assist you at any point in your life. Research I think it is vital to have research skills

start my journey with these. To be honest, I get so excited about learnings new

Pro tip Whenever you see someone on LinkedIn

things that many times I try to explore other areas.

sharing their certifications or training details, make

I joined a hackathon recently to test my ability

sure to check if that resource is still available. Trust

and understanding of new startups. Another time

me, no one is aware of all the free resources or

I participated in a capture the flag exercise run by

programs, but with smart moves you can easily

WiCyS to check my knowledge of penetration testing.

discover some of them.

The beauty of cybersecurity is that all roles seem so interesting that I want to try my hand everywhere.

126

WOMEN IN SECURITY MAGAZINE

I look at the bigger picture. I like to invest in the


S T U D E N T

S E C U R I T Y

S P O T L I G H T

membership of several organisations, groups and

to develop your circle with healthy relationships, not

associations instead of spending time on individual

just with multiple connections. It takes time, so be

learning. These offer much better options for

proactive as much as you can.

training and learning, and to grow professionally. As a student, you have the best opportunity to get

I think using all these skills helped me to become

services free, or at very low prices. It is the best time

a finalist for Best Security Student in the AWSN

to develop your skills, be they technical, leadership

Awards 2021.

or interpersonal skills. You’ll never have a better time

What qualities do you believe are required to succeed in the security industry?

Are you involved with any groups, associations or have you been mentored? Has that helped you? Who would you like to be mentored by?

The crucial qualities are:

I am involved with many organisations, associations

Learning You need to continuously and consistently

and groups that help aspirants to grow in

learn and upgrade yourself in line with the latest

cybersecurity. Some key groups are:

demands of industry.

ISACA She Leads Tech I started as a secretary of

Choosing the right mentors It is very important

the ISACA student chapter at La Trobe University in

who you look for as mentor or coach. Make sure he

2019. After my graduation I decided to keep going

or she is someone who you see yourself emulating

with ISACA and become an Ambassador of ISACA

one day. I am not saying other professionals are less

SheLeadsTech, which helps female students develop

important, but such mentors will make your journey

leadership skills.

easier.

AWSN Cadet I became a cadet of AWSN in 2020

Volunteering I love to invest my free time

and I am still an active member. I joined this

volunteering in causes that are important to me.

organisation to develop my network of students and

These activities may not all be related to security, but

other cybersecurity aspirants. I was part of the Grad

they help me to learn new skills and help me grow

Girls program and actively participated in monthly

as a person. I can say, wherever I stand today, it all

discussions with representatives from different

started from volunteering. Everything is connected.

organisations to see what they were looking for in a

One thing will lead to another eventually.

candidate, and to identify any potential opportunities

My involvement in student programs, volunteering

for myself. AWSN also helped me with technical

during the orientation phase and on other occasions,

training through bootcamps. It helped me gain

helped me to become a project officer at La

confidence in my technical skillset.

Trobe University. Those roles led me to become

AISA Student Member AISA offers free membership

an emerging leader, student representative of the

to students. I joined AISA in 2019 and since them

Science, Health and Engineering College at La Trobe,

I have attended the AISA conference every year. I

and to further achievements. Volunteering offers you

am looking forward to this year’s virtual AISACON

the opportunity to learn new skills and to challenge

as well, thanks to AWSN, which offered free tickets.

yourself without any expectations. To me it is the

AISACON is a great event where you can attend

best way to develop myself as a person and as a

topics of your choice and meet role models. It is a

professional.

wonderful opportunity to build your network.

Networking There is no need to mention the benefits

WiCyS (Women in Cybersecurity) I joined WiCyS

one can gain through networking. Profiles are not

in 2020 and attended the CTF in 2021. It is an

built in a day. Profile building is a process. You need

international platform where you can network with

than this.

WOMEN IN SECURITY MAGAZINE

127


S T U D E N T

S E C U R I T Y

S P O T L I G H T

other female aspirants in cybersecurity. We can learn

for themselves but shown the way for upcoming

and grow together.

generations in beautiful ways. However, I like to follow

There are many other programs in which I participate,

good ideas from anyone.

such as She Dares, the La Trobe Industry Mentoring and bootcamps.

What do you wish you had known about security before beginning your studies?

These programs have helped me a lot. I got access

I am not one to dwell on the past. I only dream about

to one-to-one mentoring programs through these

my future. I accept whatever has happened. I gave

programs that helped me narrow my choices, and

my best at the time, and I am happy with my journey.

helped me develop a clear vision for my career.

I have explored many skills and technologies. If I were

Program, Study Melbourne Events, CTFs, conferences

aware of even more, I might not have approached

Do you have any security heroes/heroes, people in the industry who you really admire for their roles or achievements? If so, who, and why?

the ones I did discover with the same passion and enthusiasm.

There are many people I look up to in the security

Do you listen to any security podcasts or read any security book that you would recommend?

industry and the IT industry, such as Indra Nooyi,

Books I can recommend to female students are:

Sudha Murthy, Sheryl Sandberg, Ambareen Siraj, Sir

Lean In - by Sheryl Sandberg

Ratan Tata, Ajim Premji. The list goes on. I look up

Being (Choosing to be at the top because the bottom

to them because they have not only created paths

is too crowded) by Veronica Rose.

www.linkedin.com/in/dahiya-ritu/

twitter.com/RituDahiya24 cybermanch.org/

128

WOMEN IN SECURITY MAGAZINE


Davinia Szetu is a recent graduate of La Trobe University, Melbourne in Master of Cybersecurity (Computer Science). She was born in Papua New Guinea but spent most of her childhood in the Solomon Islands.

DAVINIA SZETU

Cyber Enthusiast

Why did you choose to study security?

In fact, such challenges have driven me to push

During my high school days, IT was not part of the

boundaries and work extra hard to prove my worth

school curriculum, so I never envisioned pursuing

and have got me where I am today. However, I would

it as a career, because I had no idea what it was.

not have been able to do so without the support of

At that time, society’s expectations were that a

male colleagues. So, I have a lot of respect for male

successful young Solomon Islander would go on to

champions who support, encourage and advocate for

a career in medicine, law, accounting, or

more females to enter this male-dominated field by

aviation.

Initially, I opted for medical school but as fate would

studying and taking up a career in IT or Cybersecurity.

have it, I pursued IT instead. Besides, the degree program sounded modern and appealing andby 2009

On the other hand, most of our schools are yet to

I graduated with a bachelor’s degree in computing

introduce

science and information systems.

lack internet and computer resources. Seeing

IT into their curriculum, and many

our young female students indicate interests in Two years later I entered the Solomon Island’s

IT or cybersecurity also inspires me to continue

Government workforce as an entry-level desktop

being a role model they can look to for advice and

support technician and after four and a half years, I

guidance. I love helping people and volunteering my

began managing my own

time to encourage more girls and women in IT and

helpdesk and desktop

support team. As time progressed, the interactions

cybersecurity.

I had with clients every day in relation to virus/ for cybersecurity. Besides the eminent arrival of our

What skills do you think a person needs to succeed in the cyber field?

first undersea cable in 2019 that promised improved

I think anybody from any background regardless

telecommunications and economic growthI also

can enter the cybersecurity as it is a multifaceted

noticed a lack of qualified cybersecurity professionals

field itself. In any profession, it is important to

in our region. So, I began involving myself in

have a good combination of hard and soft skills..

cybersecurity-related workshops and trainings and my

For cyber, it would be advantageous to have an

interest in this new domain grew. After a considerable

adequate understanding of technical skills (hardware,

number of years on helpdesk, I felt it was time

networking, programming, etc), a good eye for detail,

for me to pursue a new career pathwayhence, my

analytical and problem-solving skills, the ability to

decision to undertake further education in Australia in

communicate and collaborate effectively, and the

cybersecurity.

desire to learn.

What inspires you? I have been inspired by women who succeed in IT and

What advice would you give to current or future security students?

cybersecurity careers, including those from non-IT

I believe passion and dedication are the key

and cybersecurity backgrounds. What particularly

ingredients for success in cybersecurity. You should

drives my motivation is when I am being challenged

set your goals and work consistently towards

into thinking I am not a fit for a task or role I want

achieving them. You can do this by pursuing relevant

to pursue because of my gender. One of the most

certifications (depending on your area of interest

difficult challenges I faced when I started working

in cyber) to build and enhance your skills and

as the only technical female was being stereotyped

capabilities, by staying up to date on technology and

as incapable of resolving IT issues because I was

news and trends, networking with like-minded people

female.

and experienced professionals via LinkedIn, and

malware incidents made me realise the growing need

WOMEN IN SECURITY MAGAZINE

129


Network (AWSN), the Australian Information Security

Are you part of any groups, associations or have been mentored? How has that helped you?

Association (AISA) or the Australian Computer

I took part in the Cisco MentorMe program that ran

Society (ACS).

for nine weeks and concluded in October 2021. I

by becoming an affiliated member of professional groups such as the Australian Women in Security

was very fortunate to be mentored by Andy Burke Build your profile by taking part in mentoring

from Cisco who gave me professional support and

programs, online cybersecurity internships, capture-

guidance and enabled me to network with other

the-flag (CTF) events and volunteering in cyber

professionals in the tech/cybersecurity industry.

initiatives. There is also a plethora of free self-paced

This program was very rewarding because it also

cybersecurity training platforms and resources such

gave me the opportunity to network with other

as TryHackMe, HacktheBox, Cisco, Fortinet, Cybrary,

mentees and build my connections, and I was

Mosse Cyber Security Institute (MCSI), videos, free

inspired by speakers with diverse backgrounds who

webinars, and cybersecurity blogs online that you can

shared their experiences, advice and insights on the

invest your time in. I have also found having a circle

endless possibilities of technology.

of friends and study buddies with whom you can discuss, share and study with is just as

important

to support your education and learning journey.

I am also a co-founder of the Women in IT Solomon Islands (WITSI) and I volunteer my time every year to take part in the ITU Girls in ICT Day in the Solomon

Be sure to seize any opportunity that comes your way

Islands. In May this year, we hosted the program

and

virtually for the first time in our country with girls

do not be afraid to reach out and network with

people. Work hard and believe in yourselfand do not

participating from the remote islands. I participated

be afraid to challenge yourself to new heights.

by presenting a cyber safety awareness session to young girls.

Where do you want to work, or see yourself working?

In August this year I also volunteered as a Go Girl

It has always been my desire to venture out of my

Guide for the Australian VIC ICT for Women by

comfort zone, to work abroad and gain a wealth

facilitating virtual sessions that engaged young

of experience and skills at a global level that can

females (Year 5-12) in workshops, careers expo and

help my country. My dream has always been to join

webinars in a one-day virtual conference.

reputable companies such as Google, Microsoft, Cisco, etc, or humanitarian organisations, because

I recently become a Get Safe Online Ambassador

I like helping people. I hope one day I can become a

and I look forward to volunteering my time to

qualified cybersecurity professional.

provide awareness sessions on online safety to local communities in my country and region.

What do you care about when it comes to choosing a place of work?

I am also currently a member of the following

I love organisations that have a great organisational

professional groups: Australian Women in Security

culture that embrace diversity, equity and inclusion,

Network (AWSN), Australian Information Security

and foster a welcoming, safe and respectful

Association (AISA), Australian Computer Society

environment for personal development and growth.

(ACS), Pacific Island Chapter of the Internet Society

I believe workplaces with a people-first company

(PICIS), Information Technology Society Solomon

culture, good leadership and good work ethics

Islands (ITSSI) and Women in IT Solomon Islands

can build strong relationships that can help the

(WITSI).

organisation thrive. I would look for companies offering excellent graduate/ internship/ mentorship

www.linkedin.com/in/davinia-szetu/

programs that will equip me with sought-after practical skills and that are looking to retain talent.

www.facebook.com/WomenInITSolomonIslands

www.getsafeonline.org.sb

130

WOMEN IN SECURITY MAGAZINE


01

MARCH

TURE THE FU MEN IN FOR WO Y IS SE CU RIT NO W

• APRIL

STAY CONNECTED

DOING ARE WE OUGH? EN -51 P50

P16-19

S RALIAAL’ E AUSTF M E ITY SECUERERS PION P6-10

ST THE BE IES COMPAN FOR N TO WO ME IN WO RK Y CU SE RIT P106-10

8

WWW

.WOM

ENIN

SECU

RITY

MAGA

ZINE

All the latest articles, industry news, job boards, latest books, podcasts and blogs at your fingertips. As well as the latest on our advertising, marketing, and event services.

.COM

FACEBOOK

LINKEDIN

INSTAGRAM

@wisms2c

@source2create

@womeninsecuritymagazine

TWITTER

DIGITAL

@Source2C

womeninsecuritymagazine.com

02

JUNE MAY •

womeninsecuritymagazine.com THE BEWARE T BRILLIANEC UR ITY CY BE RS JE RK P16-18

GENDER Y EQUALIT WORK WONT T THE WITHOU T OF SU PP OR O ME N, TO

ITY

DIVERS

P76-79

BER ERSE CYCU RIT Y T A DIV SE WITHOU RCE, YO UR HA SN ’T N WORKFO OR MATIO CE P08-11 TR AN SF CH AN A T GO

WWW

.WOM

ENIN

SECU

RITY

MAGA

ZINE

.COM


Ritu Dahiya obtained a masters in cybersecurity from La Trobe Yonitha Thavayogaraja (Thava) grew up in Sri Lanka and gained a bachelor of computer science from the University of Ruhuna before coming to Australia and studying for a master of information technology at Deakin University, focussing on cybersecurity and software development. She is currently doing a professional year program from Monash University.

YONITHA THAVA

AWSN Cadet Member and Volunteer at Go Girl,Go for IT

What drew you to security in the first place? Have you always wished to pursue that field of study?

told. Now, I have decided to take some certificate

I was very passionate about learning IT in grade 10

job.

but I did not satisfy the requirements for the class,

I wish companies would not leave candidates to wait

which had a limit of 25 students. After finishing year

two or three months before telling them they have

12 I chose to pursue a Bachelor of Computer Science

been unsuccessful. As an international student, I

via the Z-score system in Sri Lanka. I then decided to

waited two months from each company to receive the

study for a master’s degree at Deakin University.

result of my interview.

Initially I was majoring in software development, but I changed after I researched more about cybersecurity.

Do you have any advice for current or future security students?

I realised cybersecurity was a growing industry. So

Do not wait until you have finished your studies to

I added a second major in cybersecurity. I started

search for an internship or a job. It is better to prepare

to attend lectures and practical sessions to help me

yourself for the job market while you are pursuing

understand the basics. I would spend days reading

your studies. Be active on LinkedIn, Go Girl Go for IT,

research papers and journals to understand security.

AWSN groups, or Discord. Make connections with

courses on LinkedIn, CompTIA Security+ and CompTIACySA+, to increase my chances of getting a

people and ask about their career paths, get tips I had an internship with Digital Fortress Services

and initiate small talk. Don’t take rejections and lack

in Melbourne during my master’s degree which

of replies personally. In the past, I took everything

helped confirm my passion. I thought, eventually,

personally and felt hard done by. As an international

I would embark on a career in cybersecurity. I am

student on a temporary visa it is hard to land your first

still searching for that. I am a good learner but less

job.

confident about my abilities until someone recognises my work.

What qualities do you believe are required to succeed in the security industry?

What subject(s) do you find most interesting and/or likely to be most useful?

Don’t pretend you know everything in interviews, be

Cybersecurity management, advanced topics in digital

are open to learn and improve yourself, as well keen

security, advanced digital forensics.

to work for the company’s betterment. The job market

honest, be confident, and show the interviewer you

is getting more competitive, so undertaking certificate

What aspect of cybersecurity do you think you would like to focus on after graduating? (or) are there further security qualifications you are thinking of pursuing?

initiative.

development, applying for jobs and preparing myself

Are you involved with any groups, associations or have been mentored? Has that helped you? Who would you like to be mentored by?

for interviews. I had a few interviews, but I could not

I have been mentored by:

get a job because of budget constraints, or so I was

Saad Ayad - CEO- Digital Fortress Pty Ltd

I graduated in 2020. I focused on professional

132

courses will improve your employability and show

WOMEN IN SECURITY MAGAZINE


S T U D E N T

S E C U R I T Y

S P O T L I G H T

Daniel Jones- Security DevOps Manager, Telstra Abigail Swabey – CEO, Source2Create Joshua Pender – Senior Customer Support Manager, Mimecast I have met many people on my career journey since graduation. These people have mentored me and helped me understand the job market, how to prepare for interviews, and introduced me to different networks to support my career. They are still supporting me. I am a member of AWSN, Go Girl Go for IT, and Discord channel. I missed a few sessions hosted by AWSN because of my temporary visa and haven’t really attended many since however I would love to do it again, but I like to read the articles shared via all channels.

What do you wish you had known about security before beginning your studies? I knew nothing about cybersecurity, only IT basics, antivirus software and some coding knowledge before I started my bachelor’s degree back in Sri Lanka.

Do you listen to any security podcasts or read any security book that you would recommend? https://darknetdiaries.com/. It helps me learn new issues related to security as well as improve my analytical and communication skills.

www.linkedin.com/in/yonitha-thava/

WOMEN IN SECURITY MAGAZINE

133


LISA ROTHFIELD-KIRSCHNER Author of How We Got Cyber Smart | Amazon Bestseller

Olivia chooses to challenge gender stereotype Meet Olivia. Olivia loves technology and coding, and really enjoys the challenge of creating online games. Recently, Olivia spent the day at her mom’s work learning how to code and spot anomalies in security logs. You see, Olivia’s mom works in cybersecurity, and Olivia very much admires her mom, because the work she does is just like a superhero; protecting good people from the bad people trying to commit cyber-attacks. At school, Olivia pursues her interest in technology and all things cyber by being part of a coding club. Each week she looks forward to joining with other kids, learning how to solve problems in new ways, and creating fun and interactive online games. Olivia’s technology teacher, Ms Brightspark says she has a very structured and logical way of thinking, which gives her a natural talent for coding. Olivia always has lots of fun debugging her code and creating games for her friends to enjoy. Howver, not many of Olivia’s friends come to coding club. So one day she asked her best friend Bianca to join. Bianca has an aptitude for coding similar to Olivia’s, but was hesitant to come along. Olivia asked why Bianca didn’t want to come and she replied, “Coding club is mainly for boys, I don’t think girls are allowed.”

134

WOMEN IN SECURITY MAGAZINE

Olivia was surprised to hear Bianca say this and thought about it. Olivia realised there were many more boys than girls in coding club. Olivia wasn’t sure why, because when she visited her mom’s work, she saw lots of women working in cybersecurity and technology. Maybe this was something that needed to change? In that moment Olivia chose to challenge that coding was just for boys! Olivia said to Bianca “Us girls can code just as well as the boys can. My mom works in cybersecurity with lots of boys and girls. The main thing to focus on is learning and enjoying technology, not whether you’re a boy or girl”. Bianca wasn’t so sure, saying: “I actually wanted to join coding club last year. My friend said I should join the drama club with her. But I don’t like acting!” This made Olivia sad, because she could see Bianca wanted to join coding club but was too afraid.


Ms Brightspark told all the kids in coding club there was a competition coming up where they could create a game, and the winner would go on to compete against other schools in the finals. Olivia was excited to take part in the competition and planned to come up with a great idea for a game. Olivia thought and thought, and came up with an idea of creating a game to teach kids about cyber safety. She called her game Cyberheroes. Olivia was excited about Cyberheroes and hoped Bianca would be curious and excited to see what she had created. Bianca was very interested but was also upset about missing out on learning how to code. She still did not want to go to drama club.

www.linkedin.com/in/lisarothfield-kirschner/

www.linkedin.com/company/how-we-got-cyber-smart/ howwegotcybersmart.com/ twitter.com/howwegotcybers1

www.facebook.com/howwegotcybersmart

www.youtube.com/channel/UCezvgdYKEc7IXwVdiotQUUA www.instagram.com/howwegotcybersmart/

After school Olivia spoke to her mom. “Mom, I think Bianca should join me at coding club. She’s very interested in learning how to code, and it will be nice to have another friend to code with”. Olivia’s mom agreed because she was a champion of girls and women working in cybersecurity and technology. Olivia’s mom spoke to Ms Brightspark and offered to go to Olivia’s school to talk to all the students about why they should learn about technology, coding and cybersecurity. When she spoke to the kids there were lots of questions, especially from the girls. Olivia’s mom explained why she liked coding and cybersecurity, making Olivia burst with pride. Olivia turned to Bianca and said “See, coding is for everyone, not just the boys”. As soon as the talk was over, Bianca went to Ms Brightspark and asked if she could join coding club. Ms Brightspark said, “You’re absolutely welcome to join Bianca, but what changed your mind?” Bianca replied, “Olivia and her mom showed me I can do whatever I want, and I want to code!” Olivia and her mom smiled at each other and then did a big high five.

WOMEN IN SECURITY MAGAZINE

135


Recom mend ed by F amily zone

How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary school-aged children.

READ NOW


Some women just want

The Gift of Safety this Christmas

Upstream Investigations are proud to support the Women in Security Magazine

in the prevention, education and intervention of Domestic and Family Violence

www.upstreaminvestigations.com.au


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 01

02

1. AMANDA-JANE TURNER Author of the Demystifying Cybercrime series and Women in Tech books Conference Speaker and Cybercrime specialist

2. CODY BYRNES Director Demystify Cyber | Manager Cyber Security Australian Taxation Office

03

04

3. NIVEDITA (NIVI) NEWAR Head of Cyber Security Strategy & Governance at UNSW

4. AMY HEWSON CEO, Mitchell Personnel Solutions

05

06

5. DR ALANA MAURUSHAT Professor of Cybersecurity and Behaviour at Western Sydney University

6. EMILY HUNT National Risk and Security Operations Manager, Scentre Group

07

08

7. EMILY BAKER Regional Alliances Manager ANZ at CrowdStrike

8. BRIDGET MITCHELL Executive Manager of Security Operations at nbn

09

10

9. WENDY THOMAS President and CEO of Secureworks

10. ANITA SIASSIOS Managing Director at ManagingCX

138

WOMEN IN SECURITY MAGAZINE


11

12

11. REBECCA MOONEN Security and Privacy Influence and Cyber Safety Outreach Manager at nbn

12. KELLY PECK Associate Consultant | GRC at Cyber CX

13

14

13. AKIRA SINGH Associate Cyber Security Consultant at IBM A/NZ

14. ANU KUKAR Associate Partner, Cyber Security Strategy, Risk & Compliance at IBM A/NZ

15. CHELSEY COSTELLO 15

16 Principal Information Security Recruitment Consultant at Talenza

16. KELLY RAZLOG Head of Emerging Technology | InfoSec | Cyber Security

17

18

17. MEGHAN JACQUOT Associate Cybersecurity Threat Intelligence Analyst, Recorded Future

18. RACHEL MAYNE 19

20

Senior Associate, Cyber Security at u&u Recruitment Partners

19. ASMITA GOVIND Account Manager for Technology Recruitment at Sirius Technology

20. SKYE WU Cyber Security Investigator, Speaker, Mentor & Champion for Diversity

WOMEN IN SECURITY MAGAZINE

139


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 21

22

21. NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

22. KAREN STEPHENS Karen is CEO and co-founder of BCyber

23. SAI HONIG 23

24

CISSP, CCSP, Co-founder New Zealand Network for Women in Security

24. JESSICA ROBERTS Social Media and Content Creator volunteer, Inspiring Girls Australia

25. SARAH IANNANTUONO 25

26

Security Influencer at SEEK APAC

26. DEEPA BRADLEY Cyber Security Expert at SEEK

27. MARTY MOLLOY 27

28

Events, Marketing and Communications Coordinator, AusCERT

28. JESS DODSON Senior Customer Engineer in Security & Identity, Microsoft

29. NICOLE STEPHENSEN 29

30

Privacy expert and Director of boutique privacy firm, Ground Up Consulting

30. LAURA JIEW AWSN National Social Media & Marketing Lead Events, Marketing and Communications coordinator for AusCERT

140

WOMEN IN SECURITY MAGAZINE


31

32

31. BAYA LONQUEUX CEO at Reciproc-it

32. MEL MIGRIÑO VP and Group CISO of Meralco, Chairman of Women in Security Alliance Philippines

33

34

33. BEGOÑA ROMERO Criminologist specialist in Corporate Security

34. ANNA LEIBEL Co-author of The Secure Board Book | Director of The Secure Board advisory service

35. CLAIRE PALES 35

36

Co-author of The Secure Board Book | Director of The Secure Board advisory service

36. RYAN JANOSEVIC Co-founder and COO of Retrospect Labs

37. MIKE BARBER 37

38

CEO of the Australian Cyber Collaboration Centre (A3C)

38. CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2

39. LUKE ZILLMAN 39

40

Manager, Information Security, B.IT(DC,IS), GradCert IT(IS), MCSE, CISA, CISM, CISSP, ISO 27001 LA

40. MARISE ALPHONSO Information Security Lead at Infoxchange

WOMEN IN SECURITY MAGAZINE

141


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 41

42

41. JACQUELINE JAYNE Security Awareness Advocate - APAC, KnowBe4

42. RITU DAHIYA Founder, Cyber Manch | Ambassador, ISACA She Leads Tech | Cybersecurity Graduate, La Trobe University

43

44

43. DAVINIA SZETU Cyber Enthusiast

44. YONITHA THAVA AWSN Cadet Member and Volunteer at Go Girl,Go for IT

45. LISA ROTHFIELD-KIRSCHNER 45

46 Author of How We Got Cyber Smart | Amazon Bestseller

46. YASMIN LONDON Igniting social change & digital wellbeing for global audiences

47

48

47. ANGELA FOX Senior Vice President and Managing Director, Dell Technologies Australia and New Zealand

48. MOUFIDA RIMA Vulnerabilty Management Specialist, IAG

49

50

49. RESHMA DEVI Associate Director Enterprise Data and Analytics Risk, NAB

50. ALISON LEE Director of Logistics, Penten

142

WOMEN IN SECURITY MAGAZINE


51

52

51. SARAH HOSEY General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

52. PIP RAE Founder and Activist at Upstream Investigations

53

54

53. KAVIKA SINGHAL Information Technology Intern @ Google

54. KATE MONCKTON General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

55. MARIE PATANE 55

56

Chief Security Officer at Sydney Metro

56. SIMON CARABETTA Cyber Communications Specialist

57. LAURA BRANDON 57

Technical Lead & Senior Fullstack Engineer at Trend Micro

WOMEN IN SECURITY MAGAZINE

143


TURN IT UP

HUMANS OF INFOSEC PODCAST

THE SECURITY PODCASTS

CYBERSECURITY TODAY

By Caroline Wong

By Security

By ITWC

CLICK TO LISTEN

CLICK TO LISTEN

A podcast that explores the stories of real people, their work, and their impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security.

The Security Podcasts from Security helps you stay informed on:

YOUR CYBER PATH: HOW TO GET YOUR DREAM CYBERSECURITY JOB

THE GLOBAL REALITIES OF CYBERSECURITY

THE TRIPWIRE CYBERSECURITY PODCAST

By PwC

By Tripwire

By Kip Boyle

CLICK TO LISTEN Find out what it takes to get your dream cybersecurity job (from the hiring managers’ perspective).

144

CLICK TO LISTEN

WOMEN IN SECURITY MAGAZINE

Cybersecurity and Geopolitical issues affecting global enterprises. Security trends and technologies for risk mitigation. Advice and tips from physical security and cybersecurity thought leaders

CLICK TO LISTEN The world of Cybersecurity is evolving constantly, from increasing legislation to a changing threat landscape. PwC experts discuss the challenges and opportunities facing global organisations and share insights on how to build a resilient organisation and drive secure growth.

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.

CLICK TO LISTEN Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.


HAK5 By Darren Kitchen and Shannon Morse

CLICK TO LISTEN Hak 5 is the longest-running award-winning show on YouTube. They cover online threats, internet freedom, hardware tests, tips for faster and better working, set-up and configuration hacks, and explainers to delight those who live to code.

RECORDED FUTURE - INSIDE SECURITY INTELLIGENCE By Recorded Future

CLICK TO LISTEN Recorded Future takes you inside the world of security intelligence. They share stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. They also talk about current events, technical tradecraft, and offer up insights on the big picture issues in our industry.

ANONYMOUS WAS A WOMAN PODCAST

FUTURE WOMEN LEADERSHIP SERIES

By Future Women and Hachette Australia

By PodcastOne Australia

CLICK TO LISTEN Anonymous Was A Woman with Jamila Rizvi and Astrid Edwards is a conversation on books by, and about, women.

CLICK TO LISTEN Leadership takes courage and resilience. Host and founder of Future Women, Helen McCabe shares insights from some of the most influential women on the sometimes complex challenges faced by women on the path to senior leadership.

BREACH By Bob Sullivan and Alia Tavakolian

CLICK TO LISTEN What really happens when a hacker snatches all your data? Hosted by journalist Bob Sullivan and producer Alia Tavakolian, Breach digs into the who, why and how of history’s most notorious data breaches.

ORDINARILY EXTRAORDINARY CONVERSATIONS WITH WOMEN IN STEM By Kathy Nelson

CLICK TO LISTEN The podcast features women working in different STEM fields, at different career phases, and brings their unique perspectives and stories.

WOMEN IN SECURITY MAGAZINE

145


OFF THE SHELF

DARE TO LEAD: BRAVE WORK. TOUGH CONVERSATIONS. WHOLE HEARTS

RADICAL CANDOR: BE A KICK-ASS BOSS WITHOUT LOSING YOUR HUMANITY

Author // Brené Brown

Author // Kim Scott

How do you cultivate braver, more daring leaders, and how do you embed the value of courage in your culture?

Radical Candor is the sweet spot between managers who are obnoxiously aggressive on the one side and ruinously empathetic on the other. It is about providing guidance, which involves a mix of praise as well as criticism, delivered to produce better results and help employees develop their skills and boundaries of success. Great bosses have a strong relationship with their employees, and Kim Scott Malone has identified three simple principles for building better relationships with your employees: make it personal, get stuff done, and understand why it matters. Radical Candor offers a guide to those bewildered or exhausted by management, written for bosses and those who manage bosses. Drawing on years of firsthand experience, and distilled clearly to give actionable lessons to the reader, Radical Candor shows how to be successful while retaining your integrity and humanity. Radical Candor is the perfect handbook for those who are looking to find meaning in their job and create an environment where people both love their work, their colleagues and are motivated to strive to ever greater success.

In this new book, Brown uses research, stories, and examples to answer these questions in the no-BS style that millions of readers have come to expect and love. Brown writes, “One of the most important findings of my career is that daring leadership is a collection of four skill sets that are 100 percent teachable, observable, and measurable. It’s learning and unlearning that requires brave work, tough conversations, and showing up with your whole heart. Easy? No. Because choosing courage over comfort is not always our default. Worth it? Always. We want to be brave with our lives and our work. It’s why we’re here.” Whether you’ve read Daring Greatly and Rising Strong or you’re new to Brené Brown’s work, this book is for anyone who wants to step up and into brave leadership.

BUY THE BOOK HERE

BUY THE BOOK HERE

146

WOMEN IN SECURITY MAGAZINE

CYBER RISK LEADERS: GLOBAL C-SUITE INSIGHTS - LEADERSHIP & INFLUENCE IN THE CYBER AGE Author // Shamane Tan Cyber Risk Leaders: Global C-Suite Insights – Leadership and Influence in the Cyber Age’, by Shamane Tan – explores the art of communicating with executives, tips on navigating through corporate challenges, and reveals what the C-Suite looks for in professional partners. For those who are interested in learning from top industry leaders, or an aspiring or current CISO, this book is gold for your career. It’s the go-to book and your CISO kit for the season.

BUY THE BOOK HERE


BLINDSPOT: HIDDEN BIASES OF GOOD PEOPLE Author // Mahzarin R. Banaji and Anthony G. Greenwald “Blindspot” is the authors’ metaphor for the portion of the mind that houses hidden biases. Writing with simplicity and verve, Banaji and Greenwald question the extent to which our perceptions of social groups—without our awareness or conscious control— shape our likes and dislikes and our judgments about people’s character, abilities, and potential. In Blindspot, the authors reveal hidden biases based on their experience with the Implicit Association Test, a method that has revolutionized the way scientists learn about the human mind and that gives us a glimpse into what lies within the metaphoric blindspot. The title’s “good people” are those of us who strive to align our behavior with our intentions. The aim of Blindspot is to explain the science in plain enough language to help well-intentioned people achieve that alignment. By gaining awareness, we can adapt beliefs and behavior and “outsmart the machine” in our heads so we can be fairer to those around us. Venturing into this book is an invitation to understand our own minds.

SUBTLE ACTS OF EXCLUSION: HOW TO UNDERSTAND, IDENTIFY, AND STOP MICROAGGRESSIONS Author // Tiffany Jana and Michael Baran Our workplaces and society are growing more diverse, but are we supporting inclusive cultures? While overt racism, sexism, ableism, and other forms of discrimination are relatively easy to spot, we cannot neglect the subtler everyday actions that normalize exclusion. The book offers a clearer, more accessible term, subtle acts of exclusion, or SAEs, to emphasize the purpose and effects of these actions. After all, people generally aren’t trying to be aggressive--usually, they’re trying to say something nice, learn more about a person, be funny, or build closeness. But whether in the form of exaggerated stereotypes, backhanded compliments, unfounded assumptions, or objectification, SAE are damaging to our coworkers, friends, and acquaintances. They give simple and clear tools to identify and address such acts, offering scripts and action plans for everybody involved. Knowing how to have these conversations in an openminded, honest way will help us build trust and create stronger workplaces and healthier, happier people and communities.

BRAVE, NOT PERFECT: FEAR LESS, FAIL MORE, AND LIVE BOLDER Author // Reshma Saujani (CEO and Founder of Girls Who Code) ‘We are raising our boys to be brave, but our girls to be perfect. And this is holding us back.’ Imagine if you lived without the fear of failure, without the fear of not measuring up. If you no longer felt the need to stifle your thoughts and swallow what you really want to say in order to please and appease others. If you could stop berating yourself mercilessly for human mistakes, let go of the guilt and the strangling pressure to be perfect, and just breathe. What if, in every decision you faced, you made the brave choice or took the bolder path. Would you be happier? Would you impact the world in the ways you dream you can? In Brave, Not Perfect, Saujani shares powerful insights and practices to help us let go of our need for perfection and make bravery a lifelong habit. By being brave, not perfect, we can all become the authors of our best and most joyful life.

BUY THE BOOK HERE

BUY THE BOOK HERE BUY THE BOOK HERE

WOMEN IN SECURITY MAGAZINE

147


SURFING THE NET

WOMEN IN INTERNATIONAL SECURITY(WIIS) BLOG Women In International Security (WIIS) is the premier organization in the world dedicated to advancing the leadership and professional development of women in the field of international peace and security. The WIIS blog posts in the form of op-eds, analytical essays or shorter commentary cover a wide variety of subjects including; traditional security issues, international peace and security issues, as well as emerging security challenges and the women, peace and security agenda.

READ BLOG

CISCO BLOGS: WOMEN IN CYBERSECURITY Cisco’s women in cybersecurity blog section is focused on empowering and supporting women in cybersecurity, and helping to boost their careers. It features inspirational stories and information on how to advance in cybersecurity as well various resources women can use to network in the industry, acquire new skills and get a start in their career.

READ BLOG

STEM WOMEN STEM Women’s journey began in 2016 when they were asked to act as a gender balanced recruitment agency for a renowned graduate recruiter. They run free events for female students and graduates studying STEM subjects to network with the top STEM employers and hear from inspiring female STEM role models. Their blog features inspirational stories, recruitment tips, opportunities for women, career paths, industry research, etc.

READ BLOG

148

WOMEN IN SECURITY MAGAZINE

WOMEN IN STEM LEADERSHIP Women in STEM Leadership (WISL) aims at empowering women with the support, resources and tools needed for elevating their career and becoming an agent of change in the STEM industry. They are a network of like-minded women who are genuinely invested in helping women reach their potential. Their mission is to close the gender gap and create a more diverse and inclusive workforce.

READ BLOG


STEM LIKE A GIRL STEM Like a Girl ’s blog series, ‘Wednesday’s Women in STEM’ features different women who have or are making a difference in the fields of science, technology, engineering, and math. Their goal is to showcase the amazing accomplishments of women, both past and present. They encourage people to share these with young girls so they can learn about all the ways women help shape STEM and be inspired to discover their own STEM identity and interests!

TYNKER: WOMEN IN STEM Tynker believes that the ability to code allows children to make their ideas a reality. Tynker’s mission is to provide every child with solid foundations in Computer Science, programming, and critical thinking skills to prepare them to become better architects of their future world. Their Women in Stem blog series is aimed to increase representation and create role models for young girls

READ BLOG

READ BLOG

WOMEN CYBERSECURITY SOCIETY BLOG The Women CyberSecurity Society Inc. (WCSS) is a registered nonprofit community providing support, resources, mentorship, guidance and training to women, girls and minorities interested in advancing a career in cybersecurity. Their mission is to empower and support women and girls interested in a career in cybersecurity by removing roadblocks and obstacles. They enable women to continue the journey to become strong, confident leaders within cybersecurity of the future.

READ BLOG

THREATQUOTIENT BLOG

CYBER LEADERSHIP INSTITUTE BLOGS

CYBER SECURITY WORKS BLOG

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations with a platform that accelerates and simplifies investigations and collaboration within and across teams and tools. Their blog posts includes experts sharing their cyber threat intelligence insights and expereinces. They also share inspirational stories for women in cybersecurity to inspire young girls and women to choose cybersecurity and advance in the field.

Cyber security is rapidly changing, cyber leadership institute blog aims to keep users up-to-date with the threats, strategies and tips from their cyber security blogs at the Cyber Leadership Institute. Their mission is to empower cyber leaders to embrace the technological revolution and improve the way we all live, work and interact.

CSW is a US Department of Homeland Security–sponsored CVE Numbering Authority and a leader in Attack Surface Management. Their mission is to make security services affordable to all. Their blog covers a wide range of topics including risk management, security management, exposure management, and compliance services, etc. You can read about the latest news and updates from the cybersecurity ecosystem by checking their blog.

READ BLOG

READ BLOG

READ BLOG

WOMEN IN SECURITY MAGAZINE

149


NETWORKING SPONSOR

P R OT E CT I V E S E C U R IT Y SPONSOR

S I LV E R S P O N S O R

BRONZE SPONSORS


S U P P O RT I N G S P O N S O R S

M E R C H A N D I S E PA RT N E R S


THE AUSTRALIAN WOMEN IN SECURITY AWARDS 2021 by David Braue

Recognising 650 nominated women who are Breaking the Pattern

F

rom the moment ySafe executive

to do great things,” Source2Create CEO and publisher

director and host for the evening’s

of Women in Security Magazine Abigail Swabey said

ceremonies Yasmin London hit the

in welcoming guests to the ceremony.

stage, the atmosphere at the third annual Australian Women in Security

Supporting the cause of women in security is “one of

Awards (WISA) was electric. “Is it good

my key missions in life,” she said, “and partnering with

to be back or what?!” she exclaimed, channeling the

the AWSN and in particular [AWSN founder and CEO]

mood of everyone in attendance.

Jacqui Loustau helps me achieve that.”

Over the course of an evening filled with excitement,

“There is something very unifying about the cheers,

renewed friendships – and, of course, more than a

the claps, the pats on the back as your friend or

bit of glam and dapper – the evening proved to be

colleague makes there way to the stage to be

everything that attendees had missed out on through

recognised. Even the food will taste better under the

nearly two years of the pandemic.

lights here tonight.”

Spread across 13 different categories, the awards –

Source2Create received 650 nominations across the

themed Breaking the Pattern – recognised security

13 categories, with 21 industry judges paring down

leaders, workers, pioneers, and innovators who have

the entries to a list of 65 finalists who were gathered

helped guide the cybersecurity and protective security

in person and online to join the event.

industries through some of the toughest years in memory.

The awards wouldn’t have been possible without the strong support of CyberCX, Okta, Everbridge,

Run and produced by Source2Create and partnering

AusCERT, Netskope, Dell Technologies, Sekuro,

with the Australian Women in Security Network

Tesserent, and Trend Micro as well as merchandise

(AWSN), the awards – which were simultaneously

partners Bsides Canberra, SheLeadsTech Melbourne,

held in person and broadcast online – are designed

and Cynch Security.

“to honour our friends and inspire the next generation

152

WOMEN IN SECURITY MAGAZINE


The winners represented an eclectic range of roles

TED Talk and recently joined the executive of the

across public and private-sector organisations,

National Child Protection Alliance.

with judges recognising their excellence, initiative, competence, and commitment.

Greater Western Water was recognised as the best place to work for women in security, based on

IAG’s Moufida Rima, for example, saw in a previous

its success in reaching gender parity in its board

role that the company lacked a patch management

of directors, key leadership roles, and across its

system and single-handedly developed one –

workforce. Women head the physical, environmental,

convincing the CEO to resource the project and put

and technology security functions in the company,

her in charge of a five-member team to implement it.

whose staff have worked tirelessly to provide career lifecycle support, redesigned facilities to create

Alison Lee of Penten was the company’s first female

family-friendly spaces for staff health and wellbeing

employee and has helped boost women to 26

and overhauled its recruitment advertising to ensure a

percent of the workforce as she tirelessly pursues a

50:50 balance on job shortlists and interview panels.

50:50 gender split – proactively recruiting women, speaking and advising attendees at career expos, and

The awards also recognised pipeline development

mentoring a dozen women inside and outside of the

organisations like the AWSN Cadets program,

company.

which under the guidance of Elizabeth Bonny has expanded from a localised Melbourne pilot to a

Anu Kukar, Associate Partner – Cyber Security

national community within three years; passionate

Strategy, Risk & Compliance for ANZ with IBM, was

volunteers like Reshma Devi of NAB, who actively

recognised for creating awareness about security at

works as a mentor and organiser with AWSN, ISACA,

a global level as an enthusiastic advisor and advocate

and SheLeadsTech; highly engaged and motivated

who has spoken at 49 keynote and panel conferences

cybersecurity students like Kavika Singhal of Western

on cyber issues, AI/ML, upskilling, and lifelong

Sydney University; and technical experts such as

learning.

Trend Micro Technical Lead Laura Brandon, who deftly planned and led a complex integration project

Simon Carabetta, Project and Engagement

combining Sydney-based cloud security startup Cloud

Coordinator with the WA AustCyber Innovation

Conformity with Trend Micro’s systems.

Hub, responded to the education system’s lack of engagement with young women by championing

Last but not least, this year’s Most Outstanding

equality through panel presentations, partnering with

Woman awards went to Marie Patane – a

industry and academic institutions, and creating

consummate professional who has built a far-

Australia’s first ever mentee-to-mentor platform.

reaching, highly effective 60-strong security team from the ground up at Sydney Metro – and Kate

Sarah Hosey, Joint General Manager of nbn Australia’s

Monckton, a “true leader” whose role leading nbn

Privacy and Security Assurance, Risk and Consulting

Australia’s security, privacy assurance, risk and

team, was recognised for bringing her extensive

consulting operations has seen her coaching,

commercial and media law, privacy and customer

mentoring, leading diversity and equity initiatives, as

experiences to a role where she has challenged the

well as leading the company’s Great Place to Work

status quo and brought a customer-centric approach

initiative.

to security and privacy. To these extremely capable women, and in fact to Revolutionising the protective security industry is Pip

everyone who was nominated for the Australian

Rae, Founder and Lead Investigator with Upstream

Women in Security Awards 2021 – congratulations on

Investigations, which investigates family violence

your exemplary work as advocates, mentors, experts,

cases and provides support to victims. She is an

facilitators, educators, presenters, and the many other

active speaker at women’s events, domestic violence

ways that you contribute.

awareness evenings, and men’s mental health and change behaviour studies. She recently gave her first

WOMEN IN SECURITY MAGAZINE

153


You truly are, as the awards suggested, breaking the

Manager, Avertro

pattern – and that’s just what the security industry

FINALISTS: Candice Bowditch (Google), Jennifer

needs if we are going to help bring new capabilities,

Gorman (Entrust), Divya Saxena (DXC Technology),

new experience, and new perspectives to these

Chloe Sevil (Clyde & Co)

extremely critical industries. Keep up the good work!  The One To Watch in Protective Security. Please save the date for the 2022 event, to be held

Recognises the ‘rising star’ of the Protective

on 13 October 2022. We look forward to seeing you

security industry that’s already making a

there!

significant contribution to the protective security

AWARD CATEGORIES, WINNERS, AND FINALISTS

landscape. It applauds the individual’s proven excellence and innovation in the protective security arena, highlighting their unique capabilities and

 Unsung Hero. Unsung heroes give back to

contributions as they continue to grow in stature and

the cybersecurity community and demonstrate

gain increasing recognition.

excellence in all pursuits and endeavours. It could be

WINNER: Pip Rae, Founder and Lead Investigator,

through mentoring women in the security industry

Upstream Investigations

by tirelessly supporting, encouraging and promoting

FINALISTS: Lauren Wiggins (Penten), Sarah Wood

their professional and personal development. Or they

(AustralianSuper)

go above and beyond the call of duty to protect their organisations from cyber threats by either initiating a

 IT Security Champion. Recognises the individual

cyber risk awareness campaign or being a superstar

who effectively acts as the voice of security in any

advocate for the security industry.

given product or team. It applauds the person who’s

WINNER: Moufida Rima, Vulnerability Tools and

mastered the art of engaging people with the IT

Assessment Specialist, IAG

security message – and is more aware and better

HIGHLY COMMENDED: Fatema Hashmi, Senior

equipped to deal with the ever-evolving IT security

Security Consultant, Telstra Purple

threats.

HIGHLY COMMENDED: Katrina Avila, Director for

WINNER: Anu Kukar, Associate Partner – Cyber

Cyber Security, EY

Security Strategy, Risk & Compliance ANZ, IBM

FINALISTS: Lara Hemmaty (Optus), Alana Maurushat

HIGHLY COMMENDED: Jennifer Firbank, Cyber

(Western Sydney University), Laura O’Neill

Strategy and Influence Team Leader, Telstra

(Trustwave), Louisa Partridge (OSINT Combine),

HIGHLY COMMENDED: Joss Howard, Cybersecurity

Lisa Rothfield-Kirschner (How We Got Cyber Smart),

Partner, McgrathNicol

Louisa Vogelenzang (WomenSpeakCyber)

FINALISTS: Caitriona Forde (CyberCX & Western Power), Bridget Mitchell (nbn Australia), Duyen Tran

 The One to Watch in IT Security. Recognises the

(AustraliaSuper)

exceptional talents of an individual whose journey in IT security has shown consistent dedication and

 Protective Security Champion. Recognises the

commitment to excellence. An individual with a

‘change champion’ that’s working diligently across the

unique and personalised approach, and who will act

protective security industry to support and empower

as a role model for others.

women, either through mentorship or through

WINNER: Sarah Hosey, Joint General Manager,

collaborative work efforts and impactful leadership.

Privacy and Security Assurance, Risk and

Applauds the individual who’s made outstanding

Consulting, nbn Australia

contributions to improve the status and lives of

HIGHLY COMMENDED: Anafrid Bennet, Manager of IT

women in the protective security industry.

and Security Operations, Greater Western Water

WINNER: Alison Lee, Director of Logistics, Penten

HIGHLY COMMENDED: Irene Giantsos, Technical

FINALISTS: Fiona Byrnes (IBM), Pam La Motta

Cyber Response, NAB

(IAG)

HIGHLY COMMENDED: Archana Puri, Information

154

Security Assurance Manager, Harvey Norman

 Best Program for Young Women in Security.

SPECIAL RECOGNITION: Priyal Bhosale, Product

Recognises programs that have effectively used the

WOMEN IN SECURITY MAGAZINE


power of learning – either through teaching, lecturing

trenches – with sleeves rolled up – and contributing

or training activities – to educate and inspire young

to the field by demonstrating the qualities of a great

ladies entering security.

security leader.

WINNER: AWSN Cadets (accepted by Elizabeth

WINNER: Kavika Singhal, Western Sydney

Bonny)

University

FINALISTS: AustCyber CaDop Programs,

SPECIAL RECOGNITION: Gabriela Guiu-Sorsa, TAFE

SheLeadsTech Melbourne

Queensland FINALISTS: Victoria Cheng (UTS), Ritu Dahiya (La

 Best Place for Women to Work in Security.

Trobe University), Erika Salmon (Charles Sturt

Recognises the workplace that has adopted practices

University)

that create and foster an environment that supports, validates and encourages women to achieve their full

 Best Female Secure Coder. Recognises a

potential.

superhero coder who’s mastered the art of developing

WINNER: Greater Western Water (accepted by

computer software or programs that guard against

Anafrid, Jennifer and Louise)

security vulnerabilities.

HIGHLY COMMENDED: Xero (accepted by Charlotte

WINNER: Laura Brandon, Technical Lead, Trend

Wylie)

Micro

FINALISTS: Origin Energy, Telstra, Trustwave

HIGHLY COMMENDED: Dorien Koelemeijer, Cloud Security Engineer, Afterpay

 Male Champion of Change. Individuals

FINALISTS: Jenny Lim (IAG), Yan Liu (Retrospect

working to shift entrenched gender disparities and

Labs)

championing for more equality in the IT security industry. They demonstrate a genuine commitment

 Australia’s Most Outstanding Woman in IT

by utilising their time, investment and innovation to

Security. This award recognises female innovators

improve the issue in the industry.

leading the way in IT security – talented women at the

WINNER: Simon Carabetta, Project and Engagement

forefront of the industry demonstrating a vast array

Coordinator, WA AustCyber Innovation Hub

of inspirational work…. reshaping the security industry

HIGHLY COMMENDED: Steve Schupp, Executive

and leaving an indelible mark.

Director WA, CyberCX

WINNER: Kate Monckton, General Manager Security

SPECIAL RECOGNITION: Craig Ford, Senior Security

and Privacy Assurance, Risk and Consulting, nbn

Architect, Baidam Solutions

Australia

FINALISTS: Brendan Caughey (EY), Dan Goldberg

HIGHLY COMMENDED: Daniella Pittis, CISO, Flight

(Cybza), David Watts (IAG)

Centre Travel Group HIGHLY COMMENDED: Rachael Greaves, CEO,

 Best Volunteer. This award recognises the

Castlepoint Systems

volunteer that’s advancing the cybersecurity and safety of the Australian public, as well as businesses

 Australia’s Most Outstanding Woman in the

and governments in Australia. They are going

Protective Security Industry. Recognises the

‘above and beyond’ to raise awareness of the risks

‘all-star’ individual that’s demonstrating excellence,

and dangers of cyberattacks and data thefts in the

innovation and leadership in protective security. The

Australian community.

individual recognises that the range of threats that

WINNER: Reshma Devi, Associate Director

businesses and governments face continues to evolve

Enterprise Data and Analytics Risk, NAB

– and, therefore, works collaboratively at all levels of

HIGHLY COMMENDED: Laura Lees, Citi

the organisation or department to instil a culture of

FINALISTS: Rebecca Moonen (nbn Australia), Anita

security.

Siassios (WiCyS Australia)

WINNER: Maria Patane, Chief Security Officer, Sydney Metro

 Best Student Security Leader. Recognises an

FINALISTS: Amy Hewson (Mitchell Personnel

exceptional student who’s already making a difference

Solutions), Emily Hunt (Scentre Group)

to the security industry – a young gun superstar in the

WOMEN IN SECURITY MAGAZINE

155


THE POWERHOUSE AWARDS HOST

Interview with Yasmin London, Igniting social change & digital wellbeing for global audiences By Stuart Corner

Today she is the Executive Director of ySafe,

prepare her for post-race interviews. This piqued her

Australia’s largest provider of cyber safety education.

interest in journalism, but after graduating she ended

She oversees a team that has provided online safety

up in TV production. A work trip to Canada led to an

education to 500,000 children, 100,000 parents and

introduction to the Royal Canadian Mounted Police.

50,000 school staff on multiple aspects of digital

She was allowed to share a shift with an officer in a

wellbeing and online safety.

police car, an experience she describes as “The best fun I had ever had.” So, on her return to Australia she

While in the police force she was also cofounder and

signed on with the NSW Police and stayed for 13

president of REELise, a movement by young people to

years.

create a safe space online. It was formed in 2013 in response to local police concerns about the impact of

IT’S THE JOURNEY, NOT THE DESTINATION

cyberbullying on youth mental health.

Summing up her career path she says “I feel like the price of achieving greatness or success is

As a teenage athlete she was given media training to

156

WOMEN IN SECURITY MAGAZINE

often feeling overwhelmed, but that’s OK. One of


the greatest skills we can learn in life is getting

Once I realised that, I knew the cybersecurity space

comfortable being uncomfortable. Deciding to

even had room for someone like me to play a role in

live a life where the journey is valued over a single

protecting others.”

destination is something I prioritise.” And she says her police and journalism background In the NSW Police her media background saw her

prepared her well for this next stage in her

supervising the delivery of TV for the corporate

career, teaching her about anticipating people’s

communications department before moving into

needs, adaptability, strategic thinking, effective

community and school liaison roles and youth

communication, situational awareness and the ability

advocacy.

to read social and emotional behaviours well.

She was lured away from NSW Police for a year to

THE SKILLS THAT REALLY MATTER

work for TV production company Freehand where an

“Depth and experience in these skills are incredibly

on screen role for a show, CyberShack, introduced her

important in cybersafety and cybersecurity roles,

to the world of technology.

especially as we often don’t have the benefit of the extra communicative information that comes from

However, what really drew her into the world of

body language and tone if we are communicating

cybersecurity was working with youth through NSW

online,” she says.

Police. “As a youth liaison officer I had to deal with a couple of cyber-related incidents that happened to

Her interest in youth cybersafety led her, in 2013,

kids in our area,” she explains.

to co-founding REELise. It was born from her idea that the mobile phone could be turned into a tool of

“The first was a paedophile ring that had infiltrated a

empowerment.

group of year five and six students at a local primary school, and then I had the suicide negotiation of a 14

“Often as a police officer I saw this device being

year old girl over a cyberbullying incident. There were

used to harm others, and wanted to turn the tables

other cases, but these definitely piqued my interest in

on it. With the help of a few passionate community

the cyber safety space.”

members REELise became a not-for-profit for youth, and by youth, a movement that understands how

TECH SKILLS NOT NECESSARY

essential it is to listen to the voices of our young

London confesses to being “one of the least tech

people and ensure their online and offline experiences

savvy people ever” but says her other skills were more

are validated and learned from,” she says.

important to dealing with cyberbullying and youth cyber safety.

“Nobody wants a dictatorship and as adults we often fall into the ‘we know best’ modality when things go

“Understanding human behaviour is imperative in

awry for our kids.”

dealing with negative incidents that occur online, and the more you delve into cybersecurity, the more

GETTING INTO CYBER EDUCATION

you realise that success as a cybercriminal comes

She stepped back from REELise after taking up

down to effective social engineering and proficiency

the role of executive director of ySafe in 2018. It

in understanding and exploiting human predictability.

does much work providing cyber education through WOMEN IN SECURITY MAGAZINE

157


schools, but Yasmin believes more education about

need the depth of education that truly reflects and

cybersafety, and the online world in general, should

supports our existence within it.

be included in school curricula. “The most important factors schools need to “The recent anti vax movement, fake news and

consider are that there is regular education on the

political agendas have really shown how critical it

relevant cyber safety topics, that there are diverse

is that we teach upcoming generations true media

voices delivering the messages, that the discussion is delivered with a pro technology ethos, and that their policies and procedures reflect the

“The business case for diversity in industries like this is obvious. However for true buy-in, and to attract female talent we need to show the ‘why’ and ‘how’ behind the meaningful work conversation in this industry. We need to promote and showcase the flexible work practices that women are attracted to so they can map out potential family life, and also celebrate the wins and the fun that are part of this industry.”

current nature of the cyber safety landscape.”

PROMOTING PARENT EMPOWERMENT Parents, of course, have a significant role to play in children’s cybersafety and cyber education. To enable parents to fulfill this role London says the key is to empower them to take control of their child’s online activity and proactively support their child’s role in digital environments. “Empowerment starts with

literacy, and the ability to think critically to sort fact

education and realistic, practical strategies they

from fiction when it comes to the information they

can use in their day-to-day activities. It’s in helping

are allowing to influence their young minds.”

them find pockets of time for communication, and accessible and reliable information amongst the

She is calling for “strategies to effectively manage

noise and fear mongering out there to make sensible

and mitigate harms in depth, and that cover the

choices for their kids.”

nuanced behaviours and relationships people have online,” saying these are vital.

The Government, meanwhile, is trying to increase cyber safety with its Online Safety Bill 2021, passed

“Understanding where to seek help, and what

amid considerable controversy in June and due to

legislation is there to support people when things go

come into force early in 2022.

wrong is critical. When we live in a digital world, we

158

WOMEN IN SECURITY MAGAZINE


London believes it falls far short of what is needed.

- the trailblazers, the change makers, the young guns

“This legislation is excellent but sadly only really

and the advocates and allies that will make our digital

addresses those who are experiencing significant

world a safer and richer experience for all.”

harm. People can still be deeply affected by negative online experiences, yet not reach the benchmark for

And she says events like the awards are what is

action under this act, so we need resources that can

needed to get more girls and women into security.

effectively and positively impact those middle ground

“We need more visibility, celebration and profiling of

cases. They are certainly not ‘low level’ for the victims.

women in this industry, and also the promotion of the skills, expertise and experiences of those here that

SAFETY BY DESIGN NEEDED

aren’t traditionally technical.

“Safety by design also needs to be genuinely and proactively introduced by platforms in meaningful

“The business case for diversity in industries like this

ways, rather than retrospectively. We have the

is obvious. However for true buy-in, and to attract

technology and now need to implement ways we

female talent we need to show the ‘why’ and ‘how’

can anticipate, detect and eliminate online harms

behind the meaningful work conversation in this

before they occur, and prioritise user safety as well as

industry. We need to promote and showcase the

experience (especially when it involves young people).

flexible work practices that women are attracted to so they can map out potential family life, and also

“Regulation needs to happen, and we all need to get

celebrate the wins and the fun that are part of this

behind those creating awareness and holding to

industry.”

account those organisations who favour profits over protection.”

After almost two years of movement restrictions, the Australian Women in Security Awards event is

After a very varied career spanning two decades

particularly welcome. “When we get to throw on a

London is not sure what comes next but believes, by

ball gown after two years of an activewear wardrobe

being open to all possibilities, the right opportunity

mullet and kick up our heels - what’s not to love?

will appear. “I know I love being with people, educating, informing

www.linkedin.com/in/yasmin-london-she-her-hers92a3622b/

and empowering others. I love being in an evolving and exciting industry, and am incredibly passionate about advancing women and gender equality and unashamedly advocating for the potential that can bring if we focus on a life with that lens.”

AWARDS ADVOCATE Meanwhile, she’s very happy to be hosting the Australian Women in Security Awards. “These awards showcase and promote everything that I am passionate about and that is important in this industry

WOMEN IN SECURITY MAGAZINE

159


HOW DELL TECHNOLOGIES DOES DIVERSITY

Interview with Angela Fox, Senior Vice President and Managing Director, Dell Technologies Australia and New Zealand. By Stuart Corner

Creating a diverse workforce, by gender and

Dell Technologies does not disclose how it is tracking

ethnicity, at every level of an organisation is no easy

its gender diversity goals or equivalent ethnic diversity

task. Biases, prejudices and a shortage of suitable

goals in different regions. However, Angela Fox,

candidates all add to the challenge.

Senior Vice President and Managing Director, Dell Technologies Australia and New Zealand, says: “Rest

Perhaps it’s no wonder then that Dell Technologies

assured we have aligned with that [ethnic diversity]

calls its global diversity targets its ‘Moonshot Goals’.

goal and driving initiatives locally to achieve our

Specifically: “By 2030, our goal is for 50 percent of our

Moonshot Goal together with the global organisation.”

global workforce and 40 percent of our global people leaders to identify as women.”

She says Dell Technologies is looking at how it can translate the global ethnic diversity goal into

For the US workforce, there is another, ethnic diversity

something meaningful with Australia’s and New

goal: to have 25 percent of the workforce and 15

Zealand’s indigenous people.

percent of people leaders identifying as Black/African American or Hispanic/Latino.

To achieve its goals, Dell Technologies globally has at least a dozen programs or initiatives, not all of

160

WOMEN IN SECURITY MAGAZINE


which are replicated locally. For example, in the US

including some from overseas. “We’re continuing

the Dell Legal Diversity Award “recognises law firms

to evolve and change the content of that program

for diverse staffing on Dell matters, overall attorney

to meet the needs of what is clearly a changing

demographics at the firm, leadership opportunities

landscape within the public sector around the digital

provided to diverse attorneys, engagement of

skills and the digital professions required,” Fox says.

diverse vendors, and the creation of an inclusive environment.”

“In addition to the usual launch, mid-term event and graduation where we bring the mentors and mentees

HOMEGROWN DIVERSITY INITIATIVE

together, we have also introduced an additional six

However, Dell Technologies in ANZ has created its

events – one for mentors and five for mentees. The

own diversity initiatives that have been adopted

mentee events are designed to help build the skills

elsewhere. Dell’s Women in IT Executive Mentoring

of mentees and allow for additional networking

(WITEM) program was founded by Dell Australia in

opportunities so the cohort can leverage this powerful

2005 with the aim of accelerating the development of

group of women. Topics include building your brand,

leadership skills of women within the IT industry.

networking and career planning.”

Fox explains, it is focused on the public sector.

MANDATORY DIVERSITY TRAINING

“Individual departments identify women as having

Internally, Dell Technologies has a couple of

high potential and they come together to undertake

initiatives to eliminate gender bias from its own

a mentoring and coaching program over several

workforce. There is an online on-demand training

months. We’re proud of the fact we have been able to

and testing module, called ‘Be the Change’, designed

sustain that program for over 13 years, and more than

to deepen understanding about unconscious bias,

400 women have participated.”

intersectionality, in-groups and out-groups, equity and microaggressions, and how these can show up in the

The program pairs the participants as mentees with

workplace. The company’s goal is that all employees

senior women mentors in the public service. Each

will complete the Be the Change Essentials program

year it has around 30 participants.

in FY22.

“We spend a lot of time thinking about the matching

There is classroom training designed to identify

of those individuals to actually get the most out

and remove unconscious bias where small groups

of those pairings,” Fox says. “A real advantage of

get together to workshop situations, role play and

the program is having individuals from different

discuss.

departments engaging with other individuals at senior levels. There’s cross pollination of knowledge and

Another significant global program is Dell

growth networks around those people.

Technologies’ Employee Resource Groups. More than 54,000 employees participate in 13 ERGs in more than

“It’s been a very powerful program over many years,

74 countries.

and we’re really proud of the fact that we’ve seen a number of women who have been part of this

“These groups include a diverse set of interests

program promoted through the public sector.”

relating to various topics such asdiversity and inclusion,” Fox says. “We have an employee resource

The event was run virtually in 2021 and will in future

group focused on females, we have a group focused

be run as a hybrid program, with external speakers

on youth, we have an employee resource focused on WOMEN IN SECURITY MAGAZINE

161


faith, we have an employee resource focused on the

Pride – works to enrich the experience of global

environment. We have a MentorConnect program that

LGBTW team members and Dell’s allies and help

brings together female team members from across

them grow and be successful. Dell Technologies ANZ

Dell Technologies’ functions.”

sponsors the Pride in Diversity CEO Summit as one of its local commitments to the Pride ERG.

ENTERPRISE RESOURCE GROUPS Dell Technologies ANZ has seven ERGs, six of which

GenNext – fosters the growth and success of new

promote diversity: Mosaic, Connexus, Women in

hires and young professionals through engagement,

Action, Pride, GenNext and True Ability.

professional development and community involvement.

Mosaic – connects team members from diverse cultures and backgrounds and builds an environment

True Ability – is a group that works on developing

that values and is influenced by multicultural

best practices, awareness and solutions to empower

perspectives.

team members and allies impacted by physical or intellectual disabilities.

Connexus - focuses on technologies, best practices

HELPING WOMEN REACH THEIR GOALS

“I’m really passionate about continuing to do that myself, with my leadership team and, importantly, with the team, so that every day a person’s experience in the workplace is connected to our values and what we believe.”

Locally, Dell Technologies operates the Goal Program, a development program for senior females that focuses on their career progression to executive levels. “There’s coaching, mentoring, job shadowing, all of those things that we see as critical to helping women in their career journey and

and innovative ways of flexible working that integrate

their own professional development” Fox says.

people regardless of where they are. “Another one is ‘Releasing Your Potential’. It’s a Women in Action (WIA) – works to build an

development program that’s designed to support and

inclusive community that provides development,

enhance the advancement of women. It identifies

leadership and networking opportunities designed

specific gaps and focuses on those. These could be

to empower, retain and attract women. The group

confidence or self-awareness. They do team project

leads MentorConnect, a program that mentors female

work and training.”

talent through a structured six-month program

162

focused on managing change, leading teams,

Another global program very active locally is Dell

networking, career planning, influencing, executive

Women’s Entrepreneurship Network (DWEN) that

presence and leadership.

helps entrepreneurial women share best practices,

WOMEN IN SECURITY MAGAZINE


build business opportunities, access new resources

“Our aim for these programs is to mentor STEM

and technologies to empower their businesses.

University students who may be considering a career in IT once they complete their degree,” Fox says. “We

There are approximately 560+ female entrepreneurs

want to ensure they have a network and connection to

from ANZ in the global program. Dell Technologies

some of our team members. We have seen success

ANZ is running a Dream Tech Contest that

where UTS graduates have gone on to be working

encourages DWEN members to share their stories

full time at Dell Technologies, so it’s great to see the

and win up to $40K worth of Dell products.

focus on students is helping attract our future female talent.”

“The contest closes mid-January so I would encourage female entrepreneurs and aspiring

A WHISPER WITH THE POWER OF A ROAR

entrepreneurs to join DWEN and this contest,” Fox

The commitment to diversity at Dell Technologies,

says.

Fox says, comes from the top. “We’re extremely fortunate to have an incredibly committed leader in

“We’ve also partnered with Kochie’s Business Builders

Michael Dell. He has an expectation, and we have it in

and local female entrepreneurs to share their key

our culture that as leaders we need to be leading from

learnings and success stories.”

the front.

FOSTER DIVERSITY IN EDUCATION

“I heard an expression yesterday at the Pride in

Dell Technologies also has a number of initiatives

Diversity CEO Summit I attended: ‘A whisper at the top

in ANZ reaching out to the education sector, from

is more powerful than a roar from the bottom’. And I

primary school to university. These aim to attract

really do think that we as leaders set the tone.

more female talent into STEM. Dell Technologies hosts regular virtual STEM workshops targeting

“I’m really passionate about continuing to do that

primary and high school students and profiling

myself, with my leadership team and, importantly,

young female STEM ambassadors. Ambassadors

with the team, so that every day a person’s experience

have included Matilda McAleenan from McLaren and

in the workplace is connected to our values and what

Jessica D’Ali from Animal Logic.

we believe.”

Dell Technologies participates in the Univative program that brings together diverse groups of students from Australian universities across

www.linkedin.com/in/angelaefox/

multiple disciplines to devise innovative solutions for challenges posed by industries and communities.

twitter.com/angelaefox

They are designed to develop students beyond the classroom and help them gain experience for future career and job opportunities. Dell Technologies is one of the official partners of

Dell Technologies ANZ Blog: www.delltechnologies.com/en-au/blog/

the Lucy Mentoring Program that connects women studying engineering or technology at the University of Technology Sydney (UTS) to industry professionals for one-on-one mentoring.

Dell Technologies ANZ Website: www.delltechnologies.com/en-au/index.htm

WOMEN IN SECURITY MAGAZINE

163


2021 AUSTRALIAN WOMEN IN SECURITY AWARDS WINNERS IT SECURITY CHAMPION

THE ONE TO WATCH IN IT SECURITY

HIGHLY COMMENDED

HIGHLY COMMENDED

Jennifer Firbank Joss Howard

Irene Giantsos Archana Puri Anafrid Bennet

WINNER

WINNER

Anu Kukar

Sarah Hosey

BEST FEMALE SECURE CODER

BEST VOLUNTEER

HIGHLY COMMENDED

Dorien Koelemeijer

Laura Lees

WINNER Reshma Devi

Laura Brandon

MALE CHAMPION OF CHANGE

PROTECTIVE SECURITY CHAMPION

HIGHLY COMMENDED

HIGHLY COMMENDED

Steve Schupp

Joss Howard Jennifer Firbank

SPECIAL RECOGNITION

Simon Carabetta

Priyal Bhosale

HIGHLY COMMENDED

WINNER

WINNER

SPECIAL RECOGNITION

Craig Ford

WINNER Alison Lee


BEST SECURITY STUDENT

HIGHLY COMMENDED Gabriela Sorsa

WINNER Kavika Singhal

BEST PLACE TO WORK FOR WOMEN IN SECURITY

THE ONE TO WATCH IN PROTECTIVE SECURITY

HIGHLY COMMENDED Xero

WINNER

WINNER

Greater Western WaterWater

Pip Rae

UNSUNG HERO

BEST PROGRAM FOR YOUNG WOMEN IN SECURITY

HIGHLY COMMENDED Fatema Hashmi Katrina Avila

WINNER

WINNER

Moufida Rima

AWSN Cadets

AUSTRALIA’S MOST OUTSTANDING WOMAN IN IT SECURITY

AUSTRALIA’S MOST OUTSTANDING WOMAN IN PROTECTIVE SECURITY

HIGHLY COMMENDED Rachael Greaves Daniella Pittis

WINNER Kate Monckton

WINNER Marie Patane


UNSUNG HERO WINNER

MOUFIDA RIMA Vulnerability Management Specialist at IAG

HIGHLY COMMENDED FATEMA HASHMI Senior Security Consultant at Telstra purple

Fatema is an IT and security expert who sees many challenges remaining to overcome unconscious biases standing in the way of inclusion and gender diversity in the industry. She has been in the IT industry for nine years and in security for four and takes part in various inclusion and diversity events and anything she can do to promote women in security. She also mentors females and work with variety of organsiations to raise IT security awareness among schoolgirls.

KATRINA AVILA Director - Cyber Security at EY

Katrina is the only EY director who sits on the diversity and inclusion council, and has identified many barriers to overseas EY staff working effectively. She goes the extra mile to promote inclusivity and understand the lived experience of offshore teams. Her ability to lead and include diverse team saw her hit the top slot in her promotion cohort across EY’s technology and business consulting teams.

166

WOMEN IN SECURITY MAGAZINE


FINALISTS

MOUFIDA RIMA

ALANA MAURUSHAT

LARA HEMMATY

LAURA O’NEILL

Vulnerability Management Specialist at IAG

Professor of Cybersecurity and Behaviour at Western Sydney University

Workplace Solutions Specialist | Solutions & Cloud | Optus Enterprise

Manager at MF & Associates

FATEMA HASHMI Senior Security Consultant at Telstra purple

LISA ROTHFIELDKIRSCHNER Membership Manager at PWN ande Author of “How We Got Cyber Smart”

LOUISA PARTRIDGE Head of Marketing and Partnerships at OSINT Combine

LOUISA VOGELENZANG Head of Cybersecurity APJ | Co-founder & Director of @ WomenSpeakCyber

KATRINA AVILA Director - Cyber Security at EY

NOMINEES

ADELINE MARTIN

CORIEN VERMAAK

LI CHING LIEW

MELISSA SMELT

ALANA MAURUSHAT

FATEMA HASHMI

LIOU LIU

MINA ZAKI

ANAFRID BENNET

FFRANCES LAWES

LISA ROTHFIELD-

MOUFIDA RIMA

ANNA HARRIS

HOMATAJ (HOMA) VAFA

KIRSCHNER

NATALIE PEREZ

ANNELIESE MCDOWELL

JACQUELINE UNG

LOUISA PARTRIDGE

RESHMA DEVI

ANTONELLA ANCONA

KATRINA AVILA

LOUISA VOGELENZANG

SABINA STREATFEILD

ASHLEY MILLER

KYLIE BREHENY

MAL PARKINSON

SARAH BOX

BARBARA LIMA

KYLIE SOLUM

MANDY TURNER

SARAH CAMPBELL

CAROLYN BOLLING

LARA HEMMATY

MARIANA PAUN

TRACY COLLINS

CHELSEY COSTELLO

LAURA O'NEILL

MELISSA MCGREEVEY-

VERONICA TURNER

CHRISTINA ROSE

LELAN QUACH

WISSE

VIVIENNE MUTEMBWA WOMEN IN SECURITY MAGAZINE

167


UNSUNG HERO WINNER

Moufida Rima Vulnerabilty Management Specialist, IAG

The challenge faced by Moufida Rima in one of her

one which was heavily male-dominated, to one which

past workplaces as a minority of one will be familiar

welcomed and celebrated women.”

to many women working in cybersecurity, and in many other roles.

How did she do it? “I decided to pursue training in my own time on cyber certifications and while doing my

It was, she says, the biggest challenge of her career. “I

usual day-to-day work, I looked into creating a new

was being pushed around and my contributions were

service for the organisation, the patch management

not listened to whenever I had put them forward.”

service, as this was one of the service gaps the cybersecurity team had,” she explains. “I worked

Many women might have tolerated this treatment,

countless hours both at work and outside of work to

found another job, or made tentative steps to initiate

create everything.”

change. Moufida’s response was much more drastic,

168

and highly effective. As the winner of this year’s

‘Everything’ included not only the service itself but

Unsung Hero award, she is credited with “single-

staff and customer training materials, end-to-end

handedly transforming the workplace culture, from

documentation, and even estimates of potential

WOMEN IN SECURITY MAGAZINE


revenues available by offering patch management as

And, despite all the progress on gender

an add-on to existing customer services. She pitched

equality: “The other common problem

the idea to the CEO. It was accepted and implemented

which I have also experienced myself

by a new five-member team, headed by Moufida.

is the culture community and how that puts pressure on females,” Moufida says.

And her efforts created a more female-friendly

“For example, the expectation that women

organisation. “The work I had done echoed across the

should not work, but get married, have children,

company and I found the culture began to change.

cook and clean.”

More women were employed across different teams including the cyber teams. I was taken more seriously,

She urges every woman to help change these

and my contributions were adhered to,” she says.

attitudes. “Shifting the culture of a workplace can simply start from your colleagues you work with.

Today Moufida is a Vulnerability Tools and

Form a workplace bond with them, even among

Assessment Specialist at IAG, protecting the

males. They will be able to assist in changing the

organisation from potential threats and vulnerabilities

culture of the organisation. This will then begin to

in its cloud and on-premises resources, and she

spread and grow. It will be slow and at times, you

fills multiple voluntary roles, many focussed on

feel like you’re not going anywhere but with patience

supporting and promoting women in cyber roles.

comes change eventually.”

She is a mentor for the UNSW BITSA industry

One consequence of winning an award for ‘Unsung

mentoring program and the 2021 AWSN mentor

Hero’ is that it brings recognition: the winner

program. In both roles, she mentors women who are

immediately ceases to be unsung. Moufida says

new to cybersecurity. She is also a mentor within IAG

she will welcome the recognition. “I want people to

where she helps new female interns progress and

hear about me, my story and know that anything is

excel in their careers, and talks to them from her own

possible if you set your mind to it, never give up and

experience about the obstacles they may face.

accept that there will be obstacles along the way that will shape you to be the better person than you are

She has also done much voluntary work outside the

today.

industry. She ran a fundraiser for a close friend’s son who has multiple sclerosis. It raised $10,000 and

“I am trying to shape the future for females looking to

enabled his family to modify their house to cater for

get into the cyber field or even inspire fellow females

his needs, including providing wheelchair access. She

currently in the cyber field. I want current and future

also participates in cooking competitions through

generations to look back and read about me, to be

which she raised $5,000 for less fortunate families.

motivated and inspired to do the same or more. If I can make even the smallest impact in a young

Despite the progress made in recent years on gender

woman’s life, then I have achieved my goal.”

equality, changing attitudes in the workplace and the aspirations of women themselves, Moufida says

And, despite all she has achieved, she feels she will

much remains to be achieved. Common among the

benefit personally from the recognition. “Despite the

women she mentors is self-doubt.

experience I have in the cyber field, I still feel I am seen as an amateur by some people. Having that

“The most common phrases I hear are ‘I’m not good

recognition will help with phasing that away.”

enough’ or ‘I don’t know how to be better’. These statements come from bright, young women who have so much doubt in their minds.”

www.linkedin.com/in/moufida-rima-5941a892

WOMEN IN SECURITY MAGAZINE

169


BEST VOLUNTEER WINNER

RESHMA DEVI Associate Director Enterprise Data and Analytics Risk from NAB

HIGHLY COMMENDED LAURA LEES Country BISO ANZ aqt Citi

Laura is a passionate security advocate who has been involved in the security industry since 2002. She is the Vice President of ISACA Sydney Chapter, Co-Chapter lead for AWSN Australian Women in Security Network, and is a member of the FAIR Institute and Australian Information Security Association (AISA) Sydney chapters. She has been and continues to be an active mentor to many people, in particular through One In Tech, an ISACA Foundation, and SheLeadsTech Melbourne. Laura is the person who “finds the time,” even if it means early in the morning or in the evening, to make sure she gives her all to the people she mentors.

FINALISTS

LAURA LEES Country BISO ANZ aqt Citi

NOMINEES 170

RESHMA DEVI

REBECCA MOONEN

ANITA SIASSIOS

Associate Director Enterprise Data and Analytics Risk from NAB

Security & Privacy Influence and Cyber Safety Outreach Manager at nbn™ Australia

Founder & Managing Director at ManagingCX

AMANDA TURNER

JILLIAN TAYLOR

NOUSHIN

REBECCA

ANITA SIASSIOS

LAURA JIEW

IRANZADI

MOONEN

HOLLY WRIGHT

LAURA LEES

RESHMA DEVI

SONAL AGRAWAL

WOMEN IN SECURITY MAGAZINE


Committed to creating, promoting and growing cyber security careers for all women.

cybercx.com.au/careers


BEST VOLUNTEER WINNER

Reshma Devi Associate Director Enterprise Data and Analytics Risk, NAB

172

WOMEN IN SECURITY MAGAZINE


Reshma Devi’s day job is Associate Director

For ISACA she assists with Personal

Enterprise Data and Analytics Risk at NAB but

Development sessions, oversees the

it’s what she does as a volunteer that got her an

activities of SheLeadsTech, started and

Australian Women in Security Award for Best

assists the diversity subcommittees, and

Volunteer.

leads programs such as the International Women’s Day 2020 and 2021, and Go Girl

She’s an experienced data, security and technology

Go For IT with VIC ICT. She has also assisted

risk specialist with a Master’s in Information

with ISACA’s Melbourne webinars on security, risk,

Technology, and 20 years of experience in the

governance, privacy, data and audit.

banking and financial sector working in Australia and New Zealand. She loves anything that involves data

And most of this work is undertaken in her own time:

and is passionate about data security and emerging

her employer NAB gives her two days per year for

data challenges, and it’s her passion for supporting

voluntary work, which she dedicates to her roles with

women in cyber that scored her the award.

ISACA and AWSN.

She’s a tireless advocate for the advancement of

However, she says volunteering to support women

women in security. She leads the Women in Leadership Program at the Australian Women in Security Network (AWSN), is the AWSN Chapter Lead for Melbourne and is a mentor in the AWSN mentoring program. She’s also the Diversity Director for ISACA’s Melbourne Chapter and oversees SheLeadsTech Melbourne. She recently also judged the 2021 Techgirls

I do it because I love helping women and the pleasure I get is way more than any other philanthropy work I do. The joy of giving back to the community is unmeasurable. I do it because I genuinely want to help and give back to the community, and I will continue doing this as long as I can!

movement’s competition. These are no small tasks. Between AWSN and ISACA, Reshma works with four

in cybersecurity, empowering them to progress at

subcommittees, guiding and overseeing the activities

work and in personal life is reward enough for her

of 10 other volunteers, and is also on the ISACA

volunteering efforts.

Melbourne board. “I do it because I love helping women and the She hosts and moderates AWSN security events,

pleasure I get is way more than any other philanthropy

organises and conducts networking sessions, is

work I do. The joy of giving back to the community

a mentor for AWSN, and was a member of the

is unmeasurable. I do it because I genuinely want

selection panel awarding scholarships to women on

to help and give back to the community, and I will

a leadership course offered by the Cyber Leadership

continue doing this as long as I can!”

Institute. www.linkedin.com/in/reshma-devi-04235925/

WOMEN IN SECURITY MAGAZINE

173


PROTECTIVE SECURITY CHAMPION WINNER

ALISON LEE Director Of Logistics at Penten

FINALISTS

ALISON LEE

FIONA BYRNES

PAM LA MOTTA

Director Of Logistics at Penten

Asia Pacific & Japan Client Services Executive at IBM || President WiCyS Australia

Group Protective Security at IAG

NOMINEES ALISON LEE CHRISTINA ROSE FIONA BYRNES JO SAM NICOLE STEPHENSEN PAM LA MOTTA SARAH CARNEY

174

WOMEN IN SECURITY MAGAZINE


Keeping People Safe And Organisations Running. Faster. What Everbridge Does During public safety threats such as bushfires, earthquakes, terrorist attacks, a global pandemic, or severe weather conditions, as well as critical business events including IT outages, cyber-attacks, supply chain interruptions, all levels of government rely on Everbridge’s SaaS-based Critical Event Management platform.

Everbridge’s Critical Event Management Solutions: Ҵ Business Operations: keeping departments and operations running, faster Ҵ Digital Operations: protecting brand and reputation while providing resilience for IT systems Ҵ People Resilience: fulfilling duty of care for residents, remote and onsite employees, travelers, and field workers Ҵ Public Safety: Everbridge. Everywhere. Every time. Public Safety for every Australian Ҵ Supply Chain Risk: managing and optimising for risk to supply chains Ҵ Smart Security: smart automation, secure IoT management, big data, and advanced analytics

L E A R N M O R E AT

Everbridge.com


PROTECTIVE SECURITY CHAMPION PROFILE WINNER

Alison Lee Director of Logistics Penten

176

WOMEN IN SECURITY MAGAZINE


As the winner of this year’s Protective Security

“The role has a strong focus on supply

Champion award Alison Lee, Director Logistics at

chain management and security,

Penten — an Australian cyber security company

particularly with respect to our

focused on secure mobility, artificial intelligence and

government clients and the equipment

tactical communications — sees working in a male-

we provide,” Alison says. “I also focus on

dominated industry as an opportunity rather than a

maintaining a good general awareness of

barrier to career advancement.

security within the organisation.”

She says the imbalance creates an opportunity to

And it makes her particularly well placed to

demonstrate the abilities and benefits women can

promote security throughout the organisation.

bring to their roles. And, coming to security from a career in the Army, she is certainly no stranger to

“Having been a member of the Australian Defence

male-majority workplaces.

Force, I am able to provide people with a unique perspective into why always maintaining an

She encourages women to explore the employment

awareness of protective security, even in a seemingly

possibilities offered by protective security, saying

unrelated area such as finance, can have an impact

there are many such roles not traditionally thought

on the capability outcomes to our clients, and

of as being protective security roles. “There is a lot of support for women involved in the cyber and protective security industries and the numbers are growing,” she says. “Seeking out a mentor or a trusted advisor (either female or

“Seeking out a mentor or a trusted advisor (either female or male) within the industry can be a great way of getting a foot in the door and gaining a greater understanding of the industry and how your particular skills can contribute.”

male) within the industry can be a great way of getting a foot in the door and gaining a greater understanding of the industry and how your particular skills can contribute.”

ultimately to the personnel who may be operating in dangerous areas of the world.”

She uses her former Army role to boost female participation in the security industry by offering

She says the recognition of being named protective

mentoring for veterans transitioning from the military

security champion will further enhance her ability

to the corporate environment.

to champion protective security across Penten, by putting the spotlight on her non-traditional security

She says being Director Logistics puts her in a

role in logistics and the work she does to increase

unique position: she interacts with all facets of

protective security within the organisation.

the organisation because her role crosses over all aspects of the business: engineering, project management, accounting etc.

www.linkedin.com/in/alison-lee04897650/?originalSubdomain=au

WOMEN IN SECURITY MAGAZINE

177


THE ONE TO WATCH IN IT SECURITY WINNER

SARAH HOSEY Vulnerability Management Specialist at IAG General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

HIGHLY COMMENDED IRENE GIANTSOS Cyber Response Analyst at NAB

Irene is in a technical Cyber Response role at National Australia Bank (NAB). She completed a Bachelor of Cyber Security at Deakin University while working full time at NAB. She was a key force in driving and contributing to NAB’s partnership in the Australian Computer Academy’s (now Grok Academy’s) Schools Cyber Challenges. Irene has volunteered at countless events, including helping to coordinate and deliver the Security Industry and Trust Summits.

ARCHANA PURI Cyber Response Analyst at NAB

Archana is a cyber security expert who has helped many organisations in India, the Middle East, Europe and Australia establish effective cybersecurity, and has been instrumental in leading and driving these projects from conception to closure. She presented learnings from one such project at the 2021 Diana Initiative, a conference committed to helping all those underrepresented in Information Security.

178

WOMEN IN SECURITY MAGAZINE


ANAFRID BENNET Manager, IT & Security Operations at Greater Western Water

Anafrid is one of very few female security leaders in Critical Infrastructure - working to lift the security of operational technology. She contributed to the new critical infrastructure bill and raised the need for an OT security standard. Anafrid was also instrumental in making City West Water a leader in micro segmentation and embedded digital wellbeing initiatives into its employee wellbeing plan.

PRIYAL BHOSALE

SPECIAL RECOGNITION

Product Manager at Avertro

Priyal is passionate about strategising and designing tailored and innovative cyber and digital solutions for organisations. She played an instrumental role in Xinja’s development of a mature approach to cyber governance risk and compliance in a highly regulated environment. Part of the Averto platform that solve real cybersecurity problems for organisations of all sizes exist only because of her creativity.

FINALISTS

SARAH HOSEY Vulnerability Management Specialist at IAG General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

CANDICE BOWDITCH Security Engineer at Google University

IRENE GIANTSOS

ARCHANA PURI

Cyber Response Analyst at NAB

Cyber Response Analyst at NAB

CHLOE SEVIL

DIVYA SAXENA

Senior Associate at Clyde & Co

Practice Partner Technical at DXC Technology

ANAFRID BENNET Manager, IT & Security Operations at Greater Western Water

PRIYAL BHOSALE Product Manager at Avertro

JENNIFER GORMAN Business Development Manager at Entrust

NOMINEES AARATI PRADHANANGA AKANSHA PANDEY ALEXANDRA JURMANN AMANDA SMITH AMIE DSOUZA ANA-GABRIELA HERNANDEZ ANAFRID BENNET ANGELICA DUNGO ANUBHA SINHA ARCHANA PURI

ASHLEIGH MORGAN BINITHA SUDHEER BREARNA LEOPOLD BRONWYN MERCER CAITLIN MIKHEAL CANDICE BOWDITCH CELIA YAP CHLOE SEVIL CLAIRE COLLINS DANIELA FERNANDEZ DIVYA SAXENA

ELA OZDEMIR ELKE DUNN FIONA LONG GEMI KULANGARA GEORGIA TURNHAM IRENE GIANTSOS JACQUELINE SPAILE JENNIFER GORMAN JESSICA WILLIAMS KAREN STEPHENS KATIE DEAKIN-SHARPE KAVITA THOMAS

KHUSHBOO GUPTA LAURA DAVIS LAUREN KOCH LI CHING LIEW LINA LAU LOUISE MARTINEZ MEHRNAZ AKBARI ROUMANI NICOLE DOUEK OLIVIA VAN DER WAGEN POOJA SHANKAR

PRAMITI BHATNAGAR PRIYAL BHOSALE RAMAN GILL REBECCA WILLIAMS SAMANTHA LENGYEL SANDRA RAUB SARAH HOSEY SITA BHAT STEFANIE LUHRS TORY LANE ZOË HASSETT


THE ONE TO WATCH IN IT SECURITY WINNER

Sarah Hosey General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

Sarah Hosey, the winner of The One to Watch in IT

since.

Security award, is General Manager Security and Privacy Assurance, Risk and Consulting at nbn.

She has a legal, regulatory and commercial background and confesses to experiencing some

180

The award recognises “a master problem solver, a

imposter syndrome on being nominated, but counters

technological wizard with superior communication

this by saying “I guess the award category isn’t one of

and security skills, or a powerhouse security

reflection, it is one looking to the future, so that made

specialist that’s slated for continual distinction.”

me more comfortable being nominated.”

Nearly three years ago Sarah made the move into

She describes her role as “leading five brilliant teams

a leadership role in Security and hasn’t looked back

who provide line two guidance and support for both

WOMEN IN SECURITY MAGAZINE


security and privacy across nbn.” This role extends from consulting in the early stages of projects or new

Sarah explains. “After my 12 months was

product launches to being involved from a security

up, I had the opportunity to stay on in the

and privacy by design perspective, including supplier

Security Group in a general manager role.

assessments.

The rest is history.”

“We advise on security and privacy risks and controls,

Her own career journey perhaps explains

through to technical and strategic assurance and

the advice she offers to young women

controls testing. I’m also nbn’s Privacy Officer,” she

aspiring to a career in cybersecurity.

says. “There is no typical security professional anymore.

TEAM EMPOWERMENT

You don’t necessarily need a strong technical

And she says her favourite part of the job is

background to be successful in this space. And don’t

empowering her team, either by getting out of the way

let your lack of technical background prevent you

or asking a lot of questions.

from taking risks and hunting down opportunities for a career in security.

“I often find that helps the team or stakeholders clarify for themselves what we’re trying to achieve and the

MANY ROADS LEAD TO SECURITY

best way of doing that. I’ve learnt there’s no such

“It’s more and more important for businesses to have

thing as a dumb question. Often, you’ll ask questions

a diverse and inclusive security team, with everyone

that others have been too afraid to ask. The trick

bringing different skill sets to the table. I’d also say

is to ask questions in a non-threatening way that

that security is a fantastic speciality to come to

encourages debate and ultimately gets a team to the

after you’ve had experience in different professions.

best outcome.”

Enthusiasm, curiosity, strong communications skills and an appetite to learn and listen are incredibly

She joined nbn as a lawyer and spent time in private

valuable skills required in security.”

practice and in-house at British Sky Broadcasting in the UK, but her natural inquisitiveness led her to her

She hopes winning the award will help promote this

current role.

message and persuade more women to pursue careers in cybersecurity.

FROM LAW TO CUSTOMER EXPERIENCE “I found myself naturally becoming more and more

“This award provides a platform to demonstrate

interested in the business strategy behind particular

that there are many different paths into the security

decisions, offering non-legal opinions and probably

industry – including for women who might be keen

becoming a very annoying lawyer. So, when I had an

to move into a security career, but doubt they could

opportunity to go on secondment into nbn’s newly-

be successful because they don’t have the ‘right’

formed customer experience team, I jumped at the

technical or professional skills/qualifications. I was

chance.

one of those women.”

Her transition into cybersecurity occurred when she stood in, after being prompted to do so by a colleague, as General Manager of Privacy Engagement and Security Influence in the Security Group while the

www.linkedin.com/in/sarah-hosey896a194a/?originalSubdomain=au

incumbent took maternity leave. “I found security to be a natural home for me, given the balance of law, policy, regulation, communications, influence, strategy and commercial decision-making,” WOMEN IN SECURITY MAGAZINE

181


THE ONE TO WATCH IN PRTOECTIVE SECURITY WINNER

PIP RAE Founder and Activist at Upstream Investigations

FINALISTS

PIP RAE

SARAH WOOD

LAUREN WIGGINS

Founder and Activist at Upstream Investigations

Manager, Security Intelligence aqt AustralianSuper

Lead engineer in the Tactical Communications Security (TCS) unit at Penten

NOMINEES ALISON HOWE

182

ASHLEIGH LITTLE

JENNIFER ELLIOTT

LAUREN WIGGINS

SARAH WOOD

CLAUDIA MULLER

VESNA ERGARAC

HOLLY WRIGHT

VICTORIA ZHONG

VERONICA TURNER

PIP RAE

FIONA LONG

WOMEN IN SECURITY MAGAZINE


Keeping People Safe And Organisations Running. Faster. What Everbridge Does During public safety threats such as bushfires, earthquakes, terrorist attacks, a global pandemic, or severe weather conditions, as well as critical business events including IT outages, cyber-attacks, supply chain interruptions, all levels of government rely on Everbridge’s SaaS-based Critical Event Management platform.

Everbridge’s Critical Event Management Solutions: Ҵ Business Operations: keeping departments and operations running, faster Ҵ Digital Operations: protecting brand and reputation while providing resilience for IT systems Ҵ People Resilience: fulfilling duty of care for residents, remote and onsite employees, travelers, and field workers Ҵ Public Safety: Everbridge. Everywhere. Every time. Public Safety for every Australian Ҵ Supply Chain Risk: managing and optimising for risk to supply chains Ҵ Smart Security: smart automation, secure IoT management, big data, and advanced analytics

L E A R N M O R E AT

Everbridge.com


THE ONE TO WATCH IN PROTECTIVE SECURITY WINNER

Pip Rae Founder and Activist at Upstream Investigations

184

WOMEN IN SECURITY MAGAZINE


Pip Rae is the founder and lead investigator of

when “I saw the missing piece:

Upstream Investigations, an organisation that

investigations that identify the issues and

investigates family violence cases and provides

concerns and the help victims need to

support to victims. It aims to fill a gap between

develop a language they understand that

courts, police and lawyers and provide expertise for

describes what they have been subjected

NGOs and charities that support victims escaping

to.”

domestic violence. She spent two decades in the NSW Police Force, leaving in 2011 to undergo

She explains: “In NSW, a person in need of

treatment for chronic PTSD.

protection must apply themselves to a court and that’s daunting. So Upstream Investigations formed a

In her role at Upstream Investigations Rae now has

team of experienced and passionate advocates with

a very active role in combating domestic violence.

trauma-informed specialisation. It was a very serious

She has spoken at international women’s day events,

big picture chat that resulted in one of those ‘let’s

financial independence seminars, domestic violence

solve this problem of the world’s conversations’.”

awareness evenings and has been active in men’s mental health and change behaviour studies.

Upstream also provides evidence gathering strategies using technology and statement preparation as well

In January she’ll give her first Ted Talk, on post-

as private interventions and document services

traumatic growth, and has been elected as Vice-

for civil and family matters. It has also recruited

Chair of the National Child Protection Alliance. She

an international child trafficking investigator and

works closely with housing services and wellness

life story work counsellor who works closely with

practitioners.

clients to identify risks and opportunities for conflict resolution.

She describes Upstream as “a female-led collective of family and domestic violence specialists with a

PROTECTING CHILDREN FROM VIOLENCE

vision to fill the gap between the courts, the police

Rae was recently elected to the executive of the

and lawyers as well as providing expertise for those

National Child Protection Alliance, to help the voice

NGOs and charities who provide support and manage

of children be heard in high conflict situations, make

victims escaping violence.”

submissions regarding the investigation of child abuse to state and federal government, and deliver

It owes its name to a quote from South African cleric

education to a number of domestic violence support

Desmond Tutu, “We need to stop just pulling people

services about apprehended violence orders and

out of the river. We need to go upstream and find

evidence relating to crimes under the Family and

out why they’re falling in.” Its focus is on protecting

Domestic Violence Act 2007 and related legislation.

children from trauma and mother’s from further abuse, providing physical safety strategies and

Rae feels she is part of “a lifetime campaign to

instilling emotional resilience into the disempowered.

change the hearts and minds of a society resistant to creating equity for women and equality between the

FOCUSSED ON WOMEN’S WELLNESS

sexes.”

Rae says Upstream is “about prioritising wellness over legals, looking at options and opportunities,

She says there is a growing demand for the services

giving women the confidence to communicate during

Upstream provides and the organisation is moving

conflict and setting boundaries that respect their right

to establish numerous local female-led investigation

to live free from fear.”

agencies across Australia to meet demand.

She was watching changes to how the Queensland

Being entrepreneurial is nothing new for Rae. Prior to

Courts and Victorian Police treat domestic violence

joining NSW Police, she was a fitness instructor and WOMEN IN SECURITY MAGAZINE

185


sports massage therapist, because she had health

“Men’s violence against women and other men is a

issues as a teenager and her recovery required her to

national crisis, robbing children of healthy and happy

focus on her health.

mothers because they can’t process their jealous rage, rejection or anger in a healthy way,” she says.

“I then started a business called Athletes Advantage with a fitness program for young women called, ’Fit

Rae describes Upstream as an idea a long time

for a Bride’ to help them get fit and feel fab on their

in gestation, and one born in part from her own

wedding day. I even made it into the pages of Vogue

experience of being in an abusive relationship, and

Magazine with some amazing wedding industry leaders,” she recalls.

COMBATTING PTSD Before she left the police she was diagnosed with chronic post-traumatic stress disorder. “I had developed a slate of coping strategies like most police, but my cup was full,” she says. “It was playing out physically in my health, emotionally and psychologically, in my

In NSW, a person in need of protection must apply themselves to a court and that’s daunting. So Upstream Investigations formed a team of experienced and passionate advocates with trauma-informed specialisation. It was a very serious big picture chat that resulted in one of those ‘let’s solve this problem of the world’s conversations’.”

relationships and impacting on my self-worth. The focus for helping people was overridden by achieving a statistical output of arrests and

trying to leave it.

convictions and that didn’t sit well with me.”

AN ABUSIVE RELATIONSHIP This came after being on the front line of domestic

“I’d been given advice by doctors and counsellors

violence since the age of 19, when attitudes were

to leave the relationship and it took me to travel to

very different and a diagnosis of mental illness was

New York with my children for a month to realise just

career-ending.

how dangerous and unhappy my home had become. I didn’t even recognise myself, or love the life I had

“I’ve seen an enormous shift from domestic violence

created,” she recalls.

being a private matter to becoming a public issue that requires a community response. I remember when

“So when I came back I asked for a separation, and

I first started policing, I couldn’t believe that police

that’s when I got scared. He didn’t cope with the

would turn up to a family home where the wife had

rejection very well and struggled with mental health.

been punched and be told ‘we don’t get involved, it’s a

Even as an expert trained in domestic violence I did

private matter’.”

everything ‘they’ tell you to do and I was still unsure of how bad it had to get, who to go to and what to

She’s seen the impact of violence on children, and

say - especially because I knew the consequences of

had to tell them their mother has been injured or

reporting it to police.

murdered by their father. “That’s when I saw there was this massive gap

186

WOMEN IN SECURITY MAGAZINE


between telling your story to get the advice you need and what is relevant in the law to stop the abuse.” Prior to this she had been studying journalism and doing research into coercive control and following the Royal Commission into Family Violence in Victoria. “We discussed how all these people were ending up in the pool of desperately seeking information in a time of crisis along with some form of validation of their experience or a way out. They also needed to know how they got there and what to do about it, so it doesn’t happen again.

www.linkedin.com/in/pip-raedio76b555179/?originalSubdomain=au www.facebook.com/upstreaminvestigations www.facebook.com/giftofsafety

instagram.com/upstream_investigations

instagram.com/pipraedio

www.upstreaminvestigations.com.au/the-gift-of-safety

www.upstreaminvestigations.com.au/

“Now we advocate for victims and misidentified offenders, help them to decide on the path that works for them, connect to the right people and prepare the information for government agencies and the courts system if they need it.”

A LONG ROAD TO RECOVERY Where Rae is today is a long way from when she left the NSW Police, describing herself as “broken”, saying she never expected to recover. “I never thought the endless days of being triggered would stop and that my frazzled nervous system and anger would be something I’d have to manage forever. It was exhausting. “It took loads of therapy, a lot of unlearning, rewiring and study to get to the other side of PTSD. But this PTSD growth experience helped me understand what victims of domestic violence need. For me, it took an apology from a former work colleague to let go of the pain of feeling like I failed. Just that acknowledgement of suffering is healing and allows you to accept that you did your best and that was enough. “I now balance my world with fun and invest in friendships. And whilst I’m proud of my career, I love my life now. I feel like I’m really helping people.”

WOMEN IN SECURITY MAGAZINE

187


IT SECURITY CHAMPION WINNER

ANU KUKAR Associate Partner - Cyber Security Strategy, Risk & Compliance Australia and NZ at IBM

HIGHLY COMMENDED JENNIFER FIRBANK Cyber Security Strategy & Influence Principal at Telstra

Highly commended as an IT Security Champion is Jennifer Firbank who leads the cyber strategy and influence team at Telstra. For her vision and ability to turn the most complex technical discussion into a narrative that is easily understood and interesting for her target audience. She has demonstrated motivation, dedication, commitment and attitude to continually boosting cybersecurity in Telstra and in the wider community.

JOSS HOWARD Cybersecurity Partner at McGrathNicol

Joss was named winner of the Cyber Leadership Institute’s strategy competition, the core of an intensive eight week program reinforcing critical skills around strategy design, leadership, stakeholder engagement, board communication and persuasion. She volunteers as an advisory board member of InfoSecAssure, a Sydney based start-up helping businesses get the right security controls.

188

WOMEN IN SECURITY MAGAZINE


FINALISTS

ANU KUKAR Associate Partner - Cyber Security Strategy, Risk & Compliance Australia and NZ at IBM

JENNIFER FIRBANK

JOSS HOWARD

Cyber Security Strategy & Influence Principal at Telstra

Cybersecurity Partner at McGrathNicol

DUYEN TRAN

CAITRIONA FORDE

BRIDGET MITCHELL

Senior Manager, Information Security Assurance at AustralianSuper

Cyber Security Communication & Training Program Manager at Western Power

Executive Manager of Security Operations at nbn™ Australia

NOMINEES ANU KUKAR

JENNIFER FIRBANK

ANUBHA SINHA

JESSICA ADAMS

BARBARA COOK

JOSS HOWARD

BRIDGET MITCHELL

KARISSA BREEN

CAITRIONA FORDE

KAY MESINA

CAROLINE CUI

LOUISE HANNA

CATH WISE

NIKKI MEHTA

DUYEN TRAN

RASHMI RANI

FERESHTEH ZAMANI

SAM FARIBORZ

FIONA BRYNES

SARAH IANNANTUONO

GERGANA (KIRYAKOVA) WINZER

SHELLY MILLS

HANNAH O’NEIL

TANVI BALI

IVANA KVESIC

WOMEN IN SECURITY MAGAZINE

189


IT SECURITY CHAMPION WINNER

Anu Kukar Associate Partner - Cyber Security Strategy, Risk & Compliance for A/NZ with IBM and Director at Arascina. 190

WOMEN IN SECURITY MAGAZINE


Winning the award, she says, has given her “An

emerging technology. Anu says she took

opportunity to continue encouraging women to join

on the role to help address the global

or switch into a career in security, inspiring future

cybersecurity skills shortage.

leaders and supporting upcoming talent.”

“I am passionate about upskilling myself and my teams. It is critical for all

She says her name reflects her role:

professionals to stay relevant by upskilling. Arascina upskills in emerging technology,

• Advise - help clients solve problems.

which resonates with this passion.”

• Nurture talent - coach, mentor and support

DRIVING DIVERSITY IN CYBER AND TECH

professionals’ careers. • Untangle - cyber, data, emerging tech and thirdparty risks.

Anu says “Professionals from diverse background outside of cyber and tech have just as much to offer and contribute.” It is recognising that cyber criminals

SNAPSHOT

are constantly thinking differently. To be ahead of the

For the past six years she has shared industry knowledge and insights to other professionals through over 60 keynotes and panels at conferences/ webinars, publications and podcasts globally. This has included the USA, Denmark, Dubai, Singapore, India, Malaysia, Thailand, New Zealand and

Professionals from diverse background outside of cyber and tech have just as much to offer and contribute.

Australia. She has boosted awareness predominantly of security, emerging technology and data risk at an international level. Her

game, cybersecurity and tech professionals need to

topics have ranged across the spectrum including

think differently as well and as such, diverse teams

upskilling and life-long learning to reduce talent gaps,

become essential.

emerging technology risks in artificial intelligence and machine learning, cybersecurity risk, compliance

BOOSTING RISK MATURITY

and governance, third-party risk and data protection

As a risk advisor to business units, her focus has

across cloud and third-parties.

been on lifting enterprise risk maturity. She has led risk advisory functions to support the Chief

She is passionate about:

Information Security Officer, Chief Data Officer and Chief Technology Officer.

• Driving diversity in cyber and technology; and • Upskilling professionals in cyber.

By using the risk lens, her unique ability to collaborate with these leaders and involve security as part of

No surprise then, that she gave every attendee at the

the risk conversation has led to immense mindset

AWSN 2021 Gala Awards night the challenge to help

changes on projects. These influential techniques

upskill two professionals in cyber by the time the

have seen Anu aid security discussions to be held

2022 event is on. This way, everybody can collectively

at the beginning and throughout organisational

work to reduce the cyber talent shortage.

initiatives such as digital transformations and strategic changes.

UPSKILL PROFESSIONALS IN CYBER She has recently become a director of Arascina, an

https://www.linkedin.com/in/anukukar/

organisation dedicated to helping people upskill in WOMEN IN SECURITY MAGAZINE

191


BEST STUDENT SECURITY LEADER WINNER

KAVIKA SINGHAL Information Technology Intern at Google

SPECIAL RECOGNITION GABRIELA GUIU-SORSA Systems and Security Adviser at Siren Smoke Alarms

Gabriela is one exceptional and inspirational woman who has used her own lived experience and personal and professional challenges to launch what promises to be a stellar and changemaking career in cyber security. After being hacked and losing her life savings, she was mobilised to teach herself cyber security. After losing her job during COVID, she decided to pursue cybersecurity study. She is a volunteer, connector, teacher and mentor, who is driven by a strong desire to give to her community, help those doing it tough and empower women.

FINALISTS

KAVIKA SINGHAL Information Technology Intern @ Google

GABRIELA GUIUSORSA Systems and Security Adviser at Siren Smoke Alarms

VICTORIA CHENG Forensic Technology Vacationer at Deloitte

RITU DAHIYA

ERIKA SALMON

Assistant Project Manager at TechOps Release and Incident Green Solutions Australia Manager at Nano Digital Home Loans

NOMINEES ALAINA LAWSON

GABRIELA GUIU-SORSA

KAVIKA SINGHAL

RITU DAHIYA

AMBER SPENCE

GEORGIA PROUT

LARA HEMMATY

SELIM KANG

ELOISE ROBERTSON

HANNAH RICE

MELINA JONES

VICTORIA CHENG

EMMA SEAMAN

HARSH KAUR

MIRANDA RAFFAELE

ERIKA SALMON

JACYNTA GRIGSON

NIEVEDHA P KARTHIKEYAN



BEST STUDENT SECURITY LEADER WINNER

Kavika Singhal Information Technology Intern at Google

Kavika Singhal is studying for a Bachelor of

workshops on Blockchain technology and Open

Cybersecurity and Behaviour at Western Sydney

Source Intelligence (OSINT) aimed at introducing

University where she has consistently produced high

introducing the cyber world using OSINT to high

distinctions in her units and is on the Dean’s Merit

school students, STEM aspirants and NSW STEM

List for her outstanding performance in 2019 and

teachers.

2020. These achievements enabled her to become a member of the Academy at WSU and the Golden Key

She launched the Cyber Security Association to

International Honour Society.

create a cybersecurity community within WSU. It started as a Facebook group, which later grew to

However, it is as much for her extracurricular

over 200 members and initiated multiple activities:

activities as her academic achievements that she has

networking events for university students, CV writing

gained the accolade of Best Security Student.

session, capture the flag sessions, and practical workshops on offensive security and on identity and

She led the STEM programme, a collaboration

access management.

between WSU and NSW high schools to attract girls to the stem program as part of AustCyber’s Cyber

MICROSOFT STUDENT ACCELERATOR

Ambassadors Program. In addition, she also held

She is leading the Microsoft Student Accelerator Program for 2021, which is training over 1500

194

WOMEN IN SECURITY MAGAZINE


university students across Australia in subjects such

“The program made me realise how

as Azure fundamentals, Artificial Intelligence and

culture and diversity are huge contributing

Internet of Things. Among those they had over 450

factors in education and awareness. In

girls this year using Microsoft technologies such

2019 (offline) and 2020 (virtual), I ran a

as Azure Machine Learning Studio, Git & Github

series of digital literacy workshops for

workshops.

seven days in three different languages — Hindi, English and Punjabi — where I

As President of the Cyber Security Student

used real-life case studies to educate the

Association at WSU, she introduced the first

elderly about credit card fraud, investment and

professional chats with industry and government

superannuation fraud, phishing, and vishing scams,”

for her peers and new students to accelerate their

she says.

careers through industry and student interaction, career development and the development of

“I expected the initiative to be a teaching session.

communication and networking skills.

However, it turned into an insightful conversation on online safety and security as numerous stories and

She volunteers in Wentworthville with the Digital

instances were shared. I learned so much in those

Literacy (Cyber Safety) Program at the Indian Support

sessions.”

Centre where she runs sessions for both the elderly and the young teaching cyber safety.

When she completes her studies, Singhal says she envisions creating a significant human impact

She was the winner of Kaspersky Australia’s Secur’IT

through technology.

Cup Hackathon, and Australian representative for the Kaspersky International IT Cup in 2020. Her

“Cybersecurity is growing each day but the

team developed Vigilant which aims at teaching

implementation of it at the ground level is highly

fundamental cybersecurity and cyber safety through

necessary because that is how we as a community

gamification particularly for primary and middle

can grow together. Hence, I wish in the coming years

school children. Currently, she is using this experience

each person, old and young, regardless of economic

to create a user-friendly cybersecurity education

background, has the basic knowledge of cyber safety

guide for non-profit organisations, small businesses

and security. I will continue to work towards that.

and schools. “I also wish to work more towards a more diverse and She has been a runner-up in WSU’s Global Scope

inclusive environment for women in STEM, especially

program and Interchange program. Global Scope

cybersecurity, and create more opportunities for

empowers first year students to get firsthand

employment and skill development for international

industry experience. Interchange is an entrepreneurial

students.”

hackathon, a platform to solve sustainability and workplace challenges. Singhal is the ambassador for

And, given her commitment to cybersecurity

both programs and mentors and guides incoming

education, it’s hardly surprising Singhal says

students to the programs.

next year’s Australian Women in Security Awards should include one for Most Innovative Educator in

PROTECTING SENIOR CITIZENS

Cybersecurity. “I believe educators and professionals

Of all her volunteering initiatives she says her work

who aim at empowering individuals through

with Be Connected, an Australian government

innovative ideas should be awarded.”

initiative — imparting knowledge of basic cyber safety measures to senior citizens — is closest to her heart.

https://www.linkedin.com/in/kavika-s-b60969192/

WOMEN IN SECURITY MAGAZINE

195


BEST PLACE TO WORK WINNER

GREATER WESTERN WATER

HIGHLY COMMENDED Xero is truly making a mark in the industry, with 75% of its security leadership team female. The Xero board is 43% female, and its executive leadership team is 40%female. All people leaders in Xero are required to undertake training in diversity and inclusion and ‘Ally Skills’ training, to understand what it means to be an ally for women across the company. Their #xerotech and #womenofxero meeting places for women seeking mentors, promoting roles, sharing events of interest and generally supporting each other in the industry.

FINALISTS

GREATER WESTERN WATER

XERO

TRUSTWAVE

ORIGIN ENERGY LTD

TELSTRA

NOMINEES AKAMAI TECHNOLOGIES

196

GREATER WESTERN

NAB

TREND MICRO

ATLASSIAN

WATER

NBN

TRUSTWAVE

CITI GROUP

HEALTHSCOPE

ORIGIN ENERGY LTD

XERO

CYNCH SECURITY

IONIZE

PRIVASEC

DATA ZOO

KPMG AUSTRALIA

TELSTRA

WOMEN IN SECURITY MAGAZINE


BEST PLACE TO WORK WINNER Greater Western Water (GWW), winner of this year’s

combined cost avoidance of $3m+ through risk

Best Place to Work for Women in Security award,

mitigation, new technology implementation and skills

boasts a female managing director, a female CIO, a

and capability uplift.

female senior manager of technology and security, and a female enterprise security lead. And its security team is 80 percent female.

Numbers aside, GWW has several initiatives to support and uplift its female staff members. The IT&D leadership team have undertaken the Women in

GWW CIO, Jennifer Rebeiro says the award

Leadership Development (WILD) program, which aims

recognises the whole security team — female and

to create community empowerment and address

male members — for their hard work and dedication,

gender disparity across the STEM sector. GWW’s

and inspires all women across the

emerging leaders also participate in

organisation, the public sector, and

the VIC ICT for Women mentoring

the IT industry by recognising its

program that aims to attract young

commitment to a sustainable and

women into STEAM careers.

equitable future.

Ms Rebeiro says the combination

“Being recognised as a leading

of these programs alongside

organisation for women in security

internal mentoring and leadership

will assist our vision of being an

development initiatives, inspires

employer of choice for women

women leaders to think strategically,

and one that increases women’s

influence with impact, provide thought

participation in IT&D through

leadership, and support others

providing role models, removing

through change.

unconscious biases and discrimination,

Greater Western Water

and creating a unique, welcoming and flexible workplace for women,” Ms Rebeiro says. Overall, the company says its workforce reflects the gender and ethnic diversity of Australian society: a recent staff survey indicates 47 percent of its workforce is female, and 43 percent of the staff speak a language other than English at home. The benefits of this diversity are real. “It enables true diversity in thought and experience, which is invaluable in developing positive outcomes and solutions,” Ms Rebeiro says. “And having different perspectives helps gain an understanding of what is possible.” The female-led security team has delivered some

GWW is also developing a talent pipeline through

partnerships with Victoria University and Wyndham Tech School to encourage women to pursue careers in technology and security. “We are focused and committed to providing opportunities for women so they can build a range of leadership skills such as self-awareness, resilience and emotional intelligence,” Ms Rebeiro says. “At GWW, we promote an inclusive working environment that supports women to express confidence and tenacity. Through celebrating female empowerment, we are creating a culture where all employees, both men and women, can freely provide constructive feedback, have difficult conversations, voice innovative ideas and engage in genuine collaboration and respect”.

very quantifiable benefits. Under the guidance of CIO, Jennifer Rebeiro and IT & Security Operations

www.linkedin.com/company/greater-western-water

Manager, Anafrid Bennet, GWW delivered a three-year security uplift program and achieved an estimated

www.gww.com.au/


AUSTRALIA’S MOST OUTSTANDING WOMAN IN IT SECURITY WINNER

KATE MONCKTON General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

HIGHLY COMMENDED RACHAEL GREAVES Chief Executive Officer at Castlepoint Systems

Rachael’s a female innovator leading the way in IT security. She saw traditional information control systems failing, sometimes disastrously and worked with state and federal governments to change policy. She influenced a revolution in Australian government records management models. Her solution, Castlepoint Systems has been adopted across federal, state and local government, and regulated organisations in Australia and New Zealand. It has won major awards including; Australian Technology Competition for Cyber, AustCyber Sky’s the Limit, and Global CyberTech 100.

DANIELLA PITTIS Group Chief Information Security Officer at Flight Centre Travel Group

Daniella Pittis is an inspirational leader with a unique leadership style centred on empathy, humility, vulnerability and inclusiveness. She puts 100% of effort into developing her team, supporting initiatives and delivering outcomes. As a member of the LGBTQIA+ community, she uses her visibility and voice as a leader to encourage other members of the community to push for greater diversity, inclusion and equity through speaking engagements and mentoring and advisory roles.

198

WOMEN IN SECURITY MAGAZINE


FINALISTS

KATE MONCKTON General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia

ADRIENNE MAXTED

Partner at Deloitte

RACHAEL GREAVES

DANIELLA PITTIS

Chief Executive Officer at Castlepoint Systems

Group Chief Information Security Officer at Flight Centre Travel Group

NIVEDITA NEWAR

DANIELLA TRAINO

Head of Cyber Security Strategy & Governance at UNSW

CISO at Wesfarmers

SHAMANE TAN Chief Groth Officer at Sekuro

NOMINEES ADRIENNE MAXTED

DIVYA SAXENA

JINAN BUDGE

PAULA OLIVER

ALISON O’HARE

DR JOANNA DALTON

KATE MONCKTON

RACHAEL GREAVES

AMANDA SMITH

ELENA SCIFLEET

KATRINA AVILA

REBECCA GIBBONS

AMY ORMROD

FERESHTEH ZAMANI

LAURA LEES

SHAMANE TAN

ANKITA SAXENA

FIONA BYRNES

LINDA CAVANAGH

SHYVONE FORSTER

ANUBHA SINHA

FIONA LONG

MANDY TURNER

STEPHANIE CROWE

ASOU AMINNEZHAD

GABRIELA SORSA

MANISHA BAJPAI

SUSHEELA GUPTA

AUDREY JACQUEMART

GERGANA WINZER

MELANIE TRUSCOTT

SUSIE JONES

BETHANY COOPER

HALANA DEMAREST

MELISSA NGUYEN

TABITHA BAUER

CAIRO MALET

IRENE GIANTSOS

MITRA MINAI

THIRI HTAY VIRGINIA CALEGARE

CONNIE MCINTOSH

JEN JOHANSON

NADIA TAGGART

DANIELLA PITTIS

JENNIFER FRANCES

NIVEDITA NEWAR

DANIELLA TRAINO

JENNIFER WAUGH

PALLAVI GARG WOMEN IN SECURITY MAGAZINE

199


AUSTRALIA’S MOST OUTSTANDING WOMAN IN IT SECURITY WINNER

Kate Monckton General Manager Security and Privacy Assurance, Risk and Consulting at nbn™ Australia Kate Monckton, winner of the Most Outstanding

The genesis of her cybersecurity career was her role

Woman in IT Security award is General Manager

in management consulting in the UK with McAfee as

Security and Privacy Assurance, Risk and Consulting

a client. “I really loved the work I did with them, and

at NBN, Kate is currently nearing the end of her

that experience opened my eyes to the non-technical

second parental leave over the last three years.

opportunities in cybersecurity,” she recalls.

It’s a long way from one of her early roles. In the UK

Kate has been described as “a true leader,” a “female

she was occasionally a guest ‘technology expert’ on

frontrunner,” somebody to “have in the boardroom, be

the UK and German shopping channels.

part of steering initiatives, meeting new employees, delivering company policies, shaking clients’ hands,

200

WOMEN IN SECURITY MAGAZINE


and delivering roadmaps for a longer, stronger, diverse

and mentored an Aboriginal student who

workplace.”

won a nbn sponsored scholarship. During the lockdown, she set up ‘Security Group

Her award citation credits her with being successful

Coffee Chat Roulette’. “I made sure to

in warning people about scams leveraging the profile

group people together who otherwise

of nbn. However, she says the hard work was done by

would have been unlikely to cross paths,”

the Security Influence team she managed for many

she says.

years. Staff also complete a survey twice a year run

STOPPING SCAMMERS

by a third party that works with thousands of

The campaign was certainly successful: reported

organisations globally to provide feedback on

monthly losses fell 75 percent from $21,000 to

all areas of engagement. The results are then

$5,000, and Kate says the charity IDCare played a

benchmarked against the global averages.

significant role in this achievement. “Each year we work together to identify what’s going “I’ve worked with IDCare for many years to understand

well and what needs improvement and put together a

the details of the scams and new tools and

series of key initiatives that we deliver against. These

techniques being used. The work David Lacey and

are reported monthly up to our executive committee

his team do to help people who have fallen victim to

so there’s huge accountability and visibility,” Kate

identity theft and scams are brilliant.”

says.

One achievement she is particularly proud of is

HUMANISING CYBERSECURITY

leading and implementing the “Great Place to Work’

Kate was also a founding member of the Security

initiative that helped achieve an outstanding employee

Influence and Trust (SIT) Group whose members

engagement score for her team, putting it in the top

include representatives from a number of Australia’s

three percent globally and contributing towards nbn

major companies.

receiving the Highly Commended in the Best Place for Women to Work Award in 2020

“There were about six of us, co-founders, from big companies like Australia Post and NAB who drove it

FOCUS ON EMPLOYEE ENGAGEMENT

from the start and along the way many, many more

Kate is passionate about team engagement and

people have joined us from industry, government, and

has taken numerous initiatives at nbn outside staff

education,” Kate says.

members’ work roles to boost engagement. “The SIT Group is dedicated to humanising For the past five years, she has partnered with

cybersecurity. We support cybersecurity professionals

another general manager to run an annual health and

to develop and deliver impactful awareness and

wellbeing month. “We focus each week on a different

influence programs to mitigate people and process

aspect: fitness, mental health, nutrition, friends and

cyber risk in Australasian organisations —programs

family. These have been really great and culminate in

that influence behaviours and decisions and produce

inviting friends and family into nbn for a tour of the

positive security outcomes. We are also a conduit

nbn Discovery Centre and to get to know each other.”

for the Australian Government to engage industry stakeholders for alignment and amplification of cyber

Kate has organised many engagement activities such

security messages.”

as Christmas in July “where alongside sharing some classic English Christmas things, people shared food

Each year the group puts on a series of informal

and traditions from their own cultures and religions,”

in-person and virtual events and an annual one-day

run company-wide events with indigenous speakers

summit. “The summit is always free for attendees WOMEN IN SECURITY MAGAZINE

201


and volunteers come together from SIT member

iapp events. I quickly met some wonderful and smart

companies to help plan the line-up and execute the

people, mostly lawyers,” Kate recalls.

event,” Kate says. “There is next to zero budget. We rely on the goodwill of the member companies to provide a venue, catering, audio-visual, etc.”

“At that time privacy was largely the responsibility of lawyers and record managers but it was slowly starting to change. I struggled to find the content at

Kate chaired the virtual 2020 event, “Thanks to the hard work of Paul De

events or online that really helped from a practical perspective, so I decided to get more involved and

Araujo from nbn and the rest of

help to shape the discussion we were having here in

the committee from companies

Australia.

across the country, the summit was a huge success and had over

“I’d like to think I helped to produce events and

300 people attended from more than

content that was much about how to really ‘do’

130 corporate, government and SMB organisations.” She says the organisation welcomes new members. “There is no membership fee or

privacy risk management and not just focused on the ins and outs of legislation. “When I was elected president I worked really hard to put more rigour around how the board was run,

commitments to join. Reach out to the SIT

for example by working with everyone to set annual

Group on LinkedIn if you’d like to be involved.”

goals and a plan on how we would achieve them by breaking into smaller sub-committees. I’d also like to

A SIGNIFICANT PRIVACY ROLE

think I helped create a welcoming vibe to newcomers

Kate spent five years on the board of the International

to the industry where they could feel safe asking for

Association of Privacy Professionals Australia and

help from others.”

New Zealand (iappANZ), including two as president, before stepping down in October 2017. She was the first non-lawyer to be elected to the board of iappANZ and one of only two presidents in the organisation’s history to be asked by the board to hold the position for multiple terms. She wrote and implemented the first three-year strategic plan for the organisation, which increased membership and reduced operating costs within a year, allowing extra investment in member benefits such as industry events and the development of local certifications. Her involvement with iappANZ stemmed from being asked to become nbn’s privacy officer — she was security awareness lead at the time and had been with nbn for only five months. “I’d never built a privacy program from scratch and was looking for some help so started to attend the

202

WOMEN IN SECURITY MAGAZINE

www.linkedin.com/in/kate-monckton-b412114/


AUSTRALIA’S MOST OUTSTANDING WOMAN IN PROTECTIVE SECURITY WINNER

MARIE PATANE Chief Security Officer at Sydney Metro

FINALISTS

AMY HEWSON

MARIE PATANE

EMILY HUNT

CEO MPS

Chief Security Officer at Sydney Metro

National Risk and Security Operations Manager at SCentre Group

NOMINEES AMY HEWSON

FIONA LONG

MEMOONA J.ANWAR

AMY ORMROD

HOLLY WRIGHT

NICOLE STEPHENSEN

BHAVANA

JODIE VLASSIS

SITA BHAT

MALLIKARJUNAIAH

LI ZHAO

EMILY HUNT

MARIE PATANE WOMEN IN SECURITY MAGAZINE

203


AUSTRALIA’S MOST OUTSTANDING WOMAN IN PROTECTIVE SECURITY WINNER

Marie Patane Chief Security Officer at Sydney Metro Marie Patane, winner of this year’s Most Outstanding

The key to creating a strong and effective team,

Woman in Protective Security award, was nominated,

Patane says, is to have a mix of capabilities and

unbeknownst to her, by her team at Sydney Metro

skills that all complement each other. “Over the past

where she is Chief Security Officer. The fact the team

16 months the team has driven security governance

did this, she says, is testament to her team-building

across all aspects of the project life cycle at Sydney

capabilities.

Metro.”

“I have worked in diverse and challenging roles across

And she adds: “As someone who has experienced

my career, building high-performing teams and

bullying, gender discrimination and really poor

leading complex projects and initiatives from start to

management at times in my career, I am truly

finish. If anything, recruiting the incredibly talented

committed and motivated to nurturing my team and

and strong team at Sydney Metro, who coordinated

watching them grow.

this nomination for me shows I know how to build an award-winning team!”

“The old adage rings true; you are only as good as your people. So I ensure I invest as much time as I can in developing them and providing them

204

WOMEN IN SECURITY MAGAZINE


opportunities to speak at the executive forums and

She says Sydney Metro has engaged security

present to the board. Watching them progress in their

professionals to undertake significant security

careers also motivates me.”

assurance activities in the design stages of its projects.

TEAM NOMINATED, TWICE This is not the first time a team led by Patane has

“If we consider the broader sub-contractor

nominated her for an award. In 2019 when she

engagement by our delivery partners, that number

was General Manager Business Resilience at The

would likely be in the hundreds. Engaging so many

Star Entertainment Group, she was nominated

practitioners across all security domains — cyber,

for, and won, the Business Continuity Institute

counter-terrorism, crime prevention — has provided

(BCI) Australasian Award for Most Outstanding

us a unique opportunity to drive consistent results

Professional in the Private Sector.

across a significant proportion of the security

“That award was based on a critical business

providers in NSW and more broadly in Australia.”

analysis program which I developed and led across the organisation resulting in the understanding and

Projects in Sydney Metro cannot proceed from design

implementation of controls for the critical processes

to construction, or from construction to operation,

that would impact the organisation and business

without demonstrating that security has been

continuity thresholds if not addressed within six

considered every step of the way.

hours,” Patane says. “Because security has this elevated position in Sydney Metro is presently Australia’s largest

the project management methodology, security

infrastructure project. Patane says it has drawn on all

practitioners have more influence to ensure the

her career experiences and pushed her to learn new

infrastructure being delivered to the public is as safe

skills, with her role encompassing cybersecurity.

and secure as it can be.”

SYDNEY METRO A SECURITY LEADER

WHERE MAKEUP MEETS SECURITY

She hopes winning the award will raise both her own

Patane has come a long way from her first job — she

profile and that of Sydney Metro and highlight the

was a makeup artist. She attributes her success

importance of building security into major projects

to a combination of resilience, adaptability, self-

from the get-go. She believes Sydney Metro has a

confidence and time management, and says there are

significant role in influencing the professionalism and

commonalities between that role and what she does

capacity of the Australian security industry.

today.

“I would love the opportunity to speak to the broader

“I have always enjoyed focussing on how I can help

industry about the importance of building security

and protect people. This gives me a real sense of

processes and systems early in the project lifecycle,”

pride in what I do. I have felt this throughout my

Patane says.

career. When I was a makeup artist, being able to help someone feel more confident about themselves or

“I hope it also broadens people’s understanding

cover a scar was equally as important as assisting

of how security fits into these large infrastructure

someone in their greatest time of need or protecting

projects. I think there is an opportunity to formalise

them from the threats of the world. This is without a

the security discipline in the engineering and

doubt one of my motivations.”

construction industry akin to how safety as a profession has emerged as an integrated partner

www.linkedin.com/in/marie-patane/

in delivering projects of any scale. This could be done in partnership with industry bodies to raise the professional standing of security amongst the broader engineering community.” WOMEN IN SECURITY MAGAZINE

205


MALE CHAMPION OF CHANGE WINNER

SIMON CARABETTA Cyber Communications Specialist

HIGHLY COMMENDED STEVE SCHUPP Executive Director – CyberCX WA Branch | Founder of Asterisk Information Security - a CyberCX Company

CyberCX CEO Steve Schupp is committed to promoting gender diversity and opportunities for women in the cyber security industry. He sees primary school and high school students as future cyber professionals and is keen to challenge stereotypes when it comes to perceptions about a career in cyber. He has created many internship and work experience opportunities for young women wanting to embark on cybersecurity careers.

SPECIAL RECOGNITION CRAIG FORD Senior Security Architect at Baidam Solutions Pty Ltd | Author of A Hacker I Am & Foresight

Craig ford is a champion of women through the Australian Information Security Association, seeking out, inviting and encouraging female security professionals to present at its conferences and workshops. His latest book, Foresight, is a work of fiction about a gifted young female hacker - he wrote it to help young women believe in the possibilities of a cybersecurity career.

206

WOMEN IN SECURITY MAGAZINE


FINALISTS

SIMON CARABETTA Cyber Communications Specialist

STEVE SCHUPP

CRAIG FORD

Executive Director – CyberCX WA Branch | Founder of Asterisk Information Security - a CyberCX Company

Senior Security Architect at Baidam Solutions Pty Ltd | Author of A Hacker I Am & Foresight

BRENDAN CAUGHEY

DAN GOLDBERG

DAVID WATTS

Senior Cybersecurity Consultant at EY

CEO and Principal Partner Cybersecurity at Cybza

Group CRO at IAG

NOMINEES ANANDH MAISTRY

ELLIOT DELLYS

ASHLEY WATKINS

GARRY BARNES

PHILLIP JENKINSON

ASHWIN PAL

GREG JANKY

PRASHANT HALDANKAR

BLAIR ADAMSON

GREG SAWYER

RAY KANTOR

BRENDAN CAUGHEY

HANK CLARK

SASENKA ABEYSOORIYA

BRETT WINN

JOHN BORCHI

SIMON CARABETTA

CAITY RANDALL

JONATHAN DEAN

SIMON STAHN

PAULL DUNDON

CHATHURA ABEYDEERA

KAIF AHSAN

STEVE SCHUPP

CRAIG FORD

MARK CAREY-SMITH

THEODORE PANAGACOS

DAN GOLDBERG

MASSEH HAIDARY

WAYNE VICKERS

DAVID WATTS

MICHAEL SIMKOVIC

DION DEVOW

NICK ELLSMORE WOMEN IN SECURITY MAGAZINE

207


MALE CHAMPION OF CHANGE WINNER

Simon Carabetta Cyber Communications Specialist

208

WOMEN IN SECURITY MAGAZINE


Simon Carabetta is a project and engagement

ethnicity and cultural backgrounds, and

coordinator with the WA AustCyber Innovation Hub.

copped flak from male cybersecurity

As a former high school media studies teacher, he’s

experts for doing so!

seen how little the secondary education system does to inspire young women to pursue STEM careers.

“I was confronted a number of times by male experts within cybersecurity asking

“If our own education systems across Australia are

why I had not chosen them, often with their

paying lip-service and doing little to actually engage

arguments implying that I had preferenced others

with young women about viable IT careers, then it’s

over them based on gender,” Carabetta says.

time someone else began doing something,” he says. “Dealing with this was not new. However it became Now, he’s able to use AustCyber’s resources, contacts

apparent this was the common discourse amongst

and industry partners to create opportunities for

many men in the IT security industry.”

young women.” He made no apologies in his replies. “I simply said

SPEAKING UP AND SPEAKING OUT

their argument was completely wrong and that we

And, as a public relations and communications

were simply organising speakers who were engaging,

professional, Carabetta has no trouble calling out

extremely knowledgeable, and able to speak about

any problems he sees around diversity and gender.

cybersecurity in a non-technical and simple-to-

“I have no issue with speaking up, speaking out, and

understand manner.”

speaking clearly about what it means to be a male champion for change in cybersecurity,” he says.

BRINGING MENTORS AND MENTEES TOGETHER

Carabetta expects to have his work cut out. He says

Through the WA AustCyber Hub Carabetta is

a bottom-up, grass roots approach is needed to build

creating the first ever mentee-to-mentor platform

a more equitable industry from the ground up. “Let’s

in Australia aimed exclusively at women. He says

be completely honest here. The status quo, including

creating mentor platforms, linking up aspiring IT

those who make the key decisions, are not willing,

professionals, graduates and those transitioning

able or aware enough to accept that a complete

their careers into IT with the right mentors will guide,

overhaul of corporate culture in Australia needs to

advise, inspire and help develop young women in the

happen.

industry.

“The hardest thing l find is convincing other men

“Partnering with industry, associations and academic

who do not see the importance in more equality for

institutions including universities and TAFE’s in WA,

women. I feel, in Australia, we still have a very strong

we will pilot this program by October and look at

patriarchal overarching culture that dictates much

ways we can sustain the platform for years to come

of the discourse and commentary around gender

with the ultimate goal of creating a 50/50 gender

equality in the workplace.”

balance in Cyber security within WA by 2030.”

COPPING FLAK FOR SUPPORTING WOMEN

twitter.com/carabettasimon

Now, Carabetta creates opportunities for young women and elevates female colleagues, students

www.westcoastcyber.org/

and others at every opportunity. He organised a panel on the under-representation of women at the recent

www.linkedin.com/in/simoncarabetta/

Cyber West Summit, which he also organised. He made sure the speaker cohort was diverse in gender, WOMEN IN SECURITY MAGAZINE

209


BEST FEMALE SECURE CODER WINNER

LAURA BRANDON Technical Lead & Senior Fullstack Engineer at Trend Micro

HIGHLY COMMENDED DORIEN KOELEMEIJER Cloud Security Engineer at AfterPay

Dorien is a cloud security engineer at Afterpay, where she has made a significant impact on many projects, in particular, building an automated identity and access management in Amazon Web Services (AWS), named ‘Cloud Cover,’ and according to Afterpay will be a key piece of enabling infrastructure for its AWS environment, delivering “one of the fastest available onboarding experiences for new staff.” Dorien’s work has laid the ultimate foundation to ensure Afterpay can continue to grow and scale at a rocket ship pace.

FINALISTS

LAURA BRANDON Technical Lead & Senior Fullstack Engineer at Trend Micro

DORIEN KOELEMEIJER

Cloud Security Engineer at AfterPay

YAN LIU

JENNY LIM

Lead Software Engineer at Retrospect Labs

Specialist Developer at IAG

NOMINEES

210

AVNEET KAUR

KATHY ZHU

SNEHA PARAMASIVAN

DORIEN KOELEMEIJER

LAURA BRANDON

TANVI BALI

JENNY LIM

LI CHING LIEW

YAN LIU

WOMEN IN SECURITY MAGAZINE


Source2Create Spotlight

Media The media landscape used to be easy and simple to navigate, now not so much. Delivering to your target audience the right message, through relevant media platforms and formats, with the right content, at the right time of their journeys to achieve maximum results is complex. At S2C, we can help you build a multi-touch decision making the journey to your customer persona, taking the complexity out of your hands.

REACH OUT TODAY www.source2create.com.au

charlie@source2create.com.au

aby@source2create.com.au

vasudha@source2create.com.au


BEST FEMALE SECURE CODER WINNER

Laura Brandon Technical Lead & Senior Fullstack Engineer at Trend Micro

212

WOMEN IN SECURITY MAGAZINE


It’s often said that dogs resemble their owners. And

services, and Brandon and the team at

in the age of facial recognition technology perhaps

Trend Micro are working to add support

it’s possible to verify this. That’s exactly what Laura

for other cloud services.

Brandon, winner of this year’s Best Female Secure Coder award did while working as a research and development engineer for NEC New Zealand a few years back. She developed a human-to-dog facial matching Android application for celebrity dog trainer Cesar Milan. Today she’s engaged in rather more serious work, as Technical Lead with Trend Micro in Sydney. She joined the company in 2020, shortly after it acquired Cloud Conformity, a cloud security startup founded in 2016 that had developed a cloud security tool to protect cloud users against cloud misconfigurations and malicious actors and give them improved visibility of their workloads. Brandon led Trend Micro’s initiative to integrate the tool into Trend Micro’s own cloud security product, Cloud One, and add support for Google Cloud Platform to the tool, now known as Cloud One Conformity. It already supported AWS and Azure cloud services. Her award nomination says she tirelessly and efficiently planned for the integration, developed the most sensitive parts of identity and access control integration and led the final delivery “like a champion”.

Brandon also leads Trend Micro ANZ’s R&D Architecture Guild, a team of cloud architecture experts and enthusiasts that provides the development team with guidance on best practices.

CAN YOU HACK A COMPUTER THROUGH A PRINTER? She says her interest in cybersecurity started in 2008 when she overheard someone bragging they could hack into a computer through a printer. “I was taken aback at the possibility of this being real, and wanted to find out more,” she recalls. “By trawling through hacker forums, I formed a community online of like-minded, security-apt people. I learned how to crack passwords, use Cain & Abel [a password recovery tool Windows] to monitor my router’s traffic, detect insecure protocols such as POP3, and write bash scripts such as opening CD-ROM drives sporadically simply to annoy my sister.” As her skills grew, so too did her awareness of the importance of security within the apps she was building. “I noticed how development teams treated security as a single layer on top of applications, often retrospectively, and handled by an external team,” she

A SOFTWARE ENGINEERING ROLE MODEL

says.

Her work, the citation says, “has been exemplary and

CHALLENGING THE STATUS QUO

turned her into a role model for software engineering in the Trend Micro research and development division… This is a success story on a business and technological level, and an example of a developer successfully leading a mission-critical initiative across the enterprise.” It adds: “Her expertise in high quality and secure software development and her passion for architecture and design has uplifted our team. Laura is a great team player and always fosters a culture of inclusion and open communication. Her teammates look up to her and everyone loves working with her.” Google Cloud Platform support in Cloud One Conformity has enabled Trend Micro to secure more customers, particularly those using multiple cloud

“Interactions with the said external team were avoided and considered a nuisance to delivering software. Many organisations still operate like this, and it is the responsibility of everyone, including myself to challenge that way of thinking.” Brandon says she loves being kept on her feet, constantly learning to keep up with the industry. “A day in my life is never boring. By helping shift our mindset towards security, I hope that my actions, as small as they maybe, contribute towards a safer, more secure society.” But she still has not figured out if you can hack someone through a printer. www.linkedin.com/in/lbrandon/

WOMEN IN SECURITY MAGAZINE

213


BEST PROGRAM FOR YOUNG WOMEN IN SECURITY WINNER

AWSN CADETS

FINALISTS

AUSTCYBER CADOP PROGRAMS

SHELEADSTECH MELBOURNE

NOMINEES AUSTCYBER CADOP PROGRAMS SHELEADSTECH MELBOURNE AWSN CADETS

214

WOMEN IN SECURITY MAGAZINE

AWSN CADETS



BEST PROGRAM FOR YOUNG WOMEN IN SECURITY WINNER

AWSN Cadets The winner of this year’s Best Program for Young

AWSN Cadets supports young women in security

Women in Security, AWSN Cadets, was co-founded in

by providing them with a safe and welcoming space

2017 by Liz Bonny, Diane Loi and Jacqui Loustau.

in which to develop their skills and professional networks. It helps women overcome their fears and

216

It is an outreach program run by the Australian

challenges, to express their opinions, be vulnerable,

Women in Security Network (AWSN) that connects,

and learn from others. A strict code of conduct

supports and inspires female-identifying tertiary

is enforced to regulate behaviour and ensure all

students and early career professionals: those with

members feel safe enough to fully benefit from the

zero to three years of cyber experience.

program.

WOMEN IN SECURITY MAGAZINE


The program includes workshops and mentoring

Despite being constrained by COVID,

opportunities in fields including but not limited

AWSN Cadets has nevertheless managed

to penetration testing (a form of ethical hacking),

to organise virtual fortnightly cadet

malware reverse engineering, GRC (governance

workshops for the past 18 months, with

risk and compliance), and digital forensics used to

support from volunteers.

uncover computer crime. Says co-founder Elizabeth Bonny [Source The Victorian Connection]

“We have a fantastic set of coaches and volunteers who give up their time to present

SAFETY FIRST

sessions to AWSN Cadets’ members,” says “Mallory

A guiding principle of the organisation is that

Vallianos, one of the National Program Managers”.

psychological safety is the foundation of personal and

“We have had security company founders,

professional growth: if someone does not feel safe,

governance, risk and compliance specialists, AWS

they will find it so much more difficult to achieve any

training, and training in the Open Web Application

kind of higher-level enlightenment.

Security Project (OWASP) given over the last 18 months, to name a few.” Says Akansha Pandey,

The program uses the OK RDY mentoring app

another of the National Program Managers.

to match mentors and mentees on both their professional and personal interests. There is also a

With COVID restrictions now eased, the organisation

Cadets-specific workspace on the AWSN Slack forum.

is looking to start holding in-person Cadet sessions around the country, and is looking for additional

AWSN Cadets runs a series of free workshops and

committee members, coaches and volunteers to help

lectures for Cadets members throughout the year, to

it do so. Winning the award will raise awareness of

inspire them to pursue a career in security through

AWSN Cadets, and demand for its services.

exposure to a wide variety of security topics. There is also a members-only jobs portal through which the

“We have even more exciting things planned for the

Cadets can access potential future employers.

AWSN cadets in the future which we look forward to sharing with our community soon” says Skye Wu.

Volunteers for the program also make themselves

Anyone interested in becoming either a Cadet or a

available for members to address Cadets’ queries or

coach can find more information here.

concerns, creating an ‘instant community’ for new members to connect with.

LOCAL CHAPTERS Members are also introduced to their local AWSN chapters when they first join. Through this governance

www.linkedin.com/company/australian-women-insecurity-network-awsn/ www.awsn.org.au/

model, the Cadets program helps women overcome the challenges of ongoing gender discrimination outside the Cadets program, by giving them support and reminding them they are not alone. However, the real value of the AWSN Cadets program lies in the strength and quality of relationships created. Women have formed deep and lasting professional relationships with each other and with the cybersecurity community as a whole though the Cadets program. WOMEN IN SECURITY MAGAZINE

217



Congratulations to all

Winners Highly Commended Special Recognition

& Nominees


Don ’t m lar ges iss Au t se stra aw cur lia’ ard i t s y s of the yea r

THE 2022 AUSTRALIAN WOMEN IN SECURITY AWARDS

Want to be part of it? Register your interest today by contacting aby@source2create.com.au


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.