Issue 10

Page 104

TRAVIS QUINN

A CAMEL IS A HORSE DESIGNED BY COMMITTEE: ACHIEVING GENUINE COLLABORATION IN CYBERSECURITY By Travis Quinn, State Director at Trustwave To many organisations, cybersecurity can

not go to plan. While attitudes towards cybersecurity

appear to be a hindrance. This is unfortunate but

are maturing, outdated perceptions are still held at all

understandable, because cybersecurity often does

levels of industry, government and academia.

not contribute to their core business or does so only tangentially. Take a software developer as an

While it is convenient to blame the individuals holding

example. The core business of the developer is to

those views, they are not at fault. In part, the blame

create high quality software that is fit for purpose and

rests with the cybersecurity professionals who have

sell it to customers. Adding security features to the

failed to convince them. As a security professional

software or security oversight to the development

you have the responsibility to communicate and,

process does not necessarily add to the value of the

ideally, demonstrate the value of doing security well.

software for the customer.

You also have the responsibility to highlight the risks of doing security poorly. The latter is usually much

This is a bitter pill to swallow but is true across many

easier, but both are important.

domains in technology. In addition to not contributing

104

to its core business, the value proposition of

Within an organisation both these responsibilities

cybersecurity to an organisation is often vague. To

are best fulfilled through genuine collaboration and

some, cybersecurity is viewed as an abstract type of

tending to the often adversarial relationship that

insurance: a sunk cost to account for when things do

exists between security and other parts of your

W O M E N I N S E C U R I T Y M A G A Z I N E

S E P T E M B E R • O C T O B E R 2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Lessons from the AWSN Leader Forums

3min
pages 116-117

your compass

2min
pages 114-115

The evolution of CREST

3min
pages 112-113

A camel is a horse designed by committee: achieving genuine collaboration in cybersecurity

6min
pages 104-107

Bayanihan for International Women’s Day

4min
pages 96-97

Improving security together

2min
pages 102-103

Talking privacy

6min
pages 92-95

Entering the cyber world at a more mature age

14min
pages 80-87

Transposing consumer partnerships from the bedside to the client meeting

4min
pages 78-79

Every voice deserves to be heard

15min
pages 72-77

Relationships: essential for career success

6min
pages 68-71

How do we attract women into cybersecurity, and retain them?

7min
pages 64-67

Should you take your teen’s device as punishment?

22min
pages 60-63

working parents

7min
pages 56-59

The education question

3min
pages 54-55

Cybersecurity: it’s a hybrid team sport

4min
pages 52-53

We are all just bricks

2min
pages 46-47

Aicha Bouichou

3min
pages 44-45

Parul Mittal

11min
pages 38-43

Sarah Box

5min
pages 36-37

Angela Hall

3min
pages 20-21

Monica Zhu

7min
pages 30-33

Aastha Sahni

4min
pages 22-23

Sarah Gilbert

5min
pages 34-35

Pooja Shimpi

7min
pages 26-29

to fighting cybercrime

1min
pages 14-15

Gabe Marzano

3min
pages 24-25

Aparna Sundararajan

7min
pages 16-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.