![](https://assets.isu.pub/document-structure/230427092615-3d03f2f38eb3a0d53fc8368438fff4ee/v1/402aa49a0c5f3e2167689c5af548636b.jpeg?width=720&quality=85%2C50)
19 minute read
THE LEARNING HUB
Cyber Security Micro Skills
Courses have been designed by industry experts, in conjunction with NSW Cyber Security Innovation Node, to ensure that course content is modern, ultra-relevant, and teaches current skills using real-world examples. Courses can be completed in a matter of hours and combine to enhance industry experience, improve security expertise and protect networks that may be at risk of cyber attack. By completing each course, participants will receive a certificate of completion, as well as a digital badge to promote their newly acquired skills.
Network Engineering
The Diploma of Network Engineering will prepare you for entry-level network engineering roles by providing the skills and knowledge required to design, operate and maintain networks that play a crucial role in the infrastructure of industry and government organisations. Your coursework will cover key areas of network engineering, including data networks and their implementation. You will combine academic studies with practical experience allowing you to further develop your skill set and provide you with the opportunity to stand out from the crowd in a competitive industry. You can also use this qualification to move into our other degree programs such as the Bachelor of Information Technology or Bachelor of Software Engineering Honours.
We have loved seeing all the amazing nominations coming in and thought we'd give something back
We are giving away 10 tickets to attend the Women in Security Awards!
![](https://assets.isu.pub/document-structure/230427092615-3d03f2f38eb3a0d53fc8368438fff4ee/v1/05f23ccbb8e9cbdfac494bd389c8a190.jpeg?width=720&quality=85%2C50)
To Enter:
- Make sure you are following us @Source2Create
- Nominate for the awards between 26th April and 26th May
To nominate for the awards, visit: https://womeninsecurityawards.awardsplatform.com/
Principles Of Cyber Security
![](https://assets.isu.pub/document-structure/230427092615-3d03f2f38eb3a0d53fc8368438fff4ee/v1/e3165b786904f1c858729eedff84cfef.jpeg?width=720&quality=85%2C50)
“Are you looking to gain a greater understanding or build upon existing knowledge of Cyber Security issues? Are you seeking employment in a Cyber Security related role and want to have a
Technology In Education
With Mickey Revenaugh
Technology changes the way we learn and engage with content. Throughout her career, Mickey Revenaugh has worked on bringing technological advancements to education. Mickey is currently Vice President of Business Development in Global Online Learning at Pearson.
Tech And The City
With Billie Quinlan
“Billie Quinlan is the co-founder and CEO of Ferly, a female-focussed sexual wellness app. She tells AnneMarie how technology is helping women discover their sexuality, and change the way people think about sex. They also talk about her journey from aspiring actress to head of her own start-up, including having to learn new skills.
Leading Women In Tech Podcast
With Toni Collis
“On this podcast, we explore the techniques, tips and strategies you can use to become a standout leader. To give you the time and credibility to focus on what you love doing instead of justifying yourself every moment along the way. I’ll be sharing with you my best insights designed to make success not just simple, but inevitable.”
Pioneering Through Tech With Confidence
With Roz Ho
In this episode of Women in Tech with Ariana, Ariana interviews Roz Ho. Roz is the Vice President and Global Head of Software at HP (Hewlett Packard). Subscribe to our Women in Tech email list: www.wallwaytech.com/podcastlinks and watch this episode on the Women in Tech with Ariana Youtube Channel.
The Burn Bag
With Andrea Ochoa
The *hottest* national security and foreign policy podcast featuring conversations with leading policy practitioners, thinkers, and leaders. In each episode, we open up a ‘burn bag’ to breakdown some of the most pressing security challenges of today’s world with the people who have worked and lived them.
Tech4evil
With Manal al-Sharif and Reinhardt Sosin
From artificial intelligence and data mining to social media and dating apps, tech has touched our lives on every level. In Tech for Evil (Tech4Evil.com) podcast, we talk about the impact of Big Tech on our minds, planet and liberties. We also expose what Big Tech doesn’t want you to know and what you can do about it.
Women In Security Podcast
With Lifen Tan
Of information & cyber security and the great women who make it turn. In each episode, I sit down with a guest speaker to discuss their experiences and touch on some of the lesser known aspects of the industry. We’ll shed light on the routes to the various technical and non-technical roles in this space, as well as exploring the skillsets required to be successful.
Herhax Podcast
With HerHax
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
2 Cyber Chicks Podcast
With Erika McDuffie and Jax Scott
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting.
Women In National Security
With Abigail Bradshaw
In this episode, Head of the Australian Cyber Security Centre (ACSC) and Deputy Director-General of the Australian Signals Directorate (ASD) Abigail Bradshaw explains the steps the ACSC has taken to achieve gender balance in their workforce and how they support working families. They also discuss her love of leadership and approach to helping others become amazing leaders themselves.
Cyber Warrior
With Nigel LeBlanc
In this episode, Amanda Lee Keammerer, Founder and CEO of Javilud LLC, comes up with a deep conversation about gender inequality in cybersecurity with five unique and super talented women with different backgrounds, experiences, and journeys into the industry. Participating with us today is Annalise Buonya, a leader in cyber security who placed top 25 last year in the Cyber Wraith Tournament.
There Are No Girls On The Internet
With Bridget Todd
Marginalized voices have always been at the forefront of the internet, yet our stories often go overlooked. Bridget Todd chronicles our experiences online, and the ways marginalized voices have shaped the internet from the very beginning. We need monuments to all of the identities that make being online what it is. So let’s build them.
VISION & VOICE
With Naomi Buckwalter
On June 30th, SafeGuard Cyber hosted a leadership panel called, ”Vision & Voice: Removing Barriers for Women in Cybersecurity.” It was so well attended, that we wanted to make it available to a wider audience. This conversation featured insights from women cyber leaders Naomi Buckwalter, Amy De Salvatore, and Evelyn de Souza.
CREATING CONNECTIONS: EMBRACING OPPORTUNITY
With Gloria Steinem
We know that our industry is full of change and with that change comes opportunity whether it is for a new role, a new company, or a completely different path. I am here to tell you to go for it! Take that step, work toward your dreams and embrace the opportunity in front of you.
Women In Software And Cybersecurity
With Grace Lewis
In her work at the SEI, Grace Lewis focuses on securely pushing cloud resources to the edge and integrating IoT devices into systems. In this SEI Podcast, Lewis discusses her career journey, which led to her leading Tactical Edge Computing at the SEI.
SMART WOMEN, SMART POWER PODCAST
With Cera Baker
This biweekly podcast features powerful, in-depth conversations with women leaders from around the globe who are experts in foreign policy, national security, international business, and international development. It ranks among the top non-profit and government podcasts.
National Security Podcast
With Nina Davidson, Catherine Burn and Abigail Bradshaw
To celebrate the final episode of the Women in National Security mini-series, the ANU National Security College hosted a networking event and live podcast recording with more than 250 women at the National Gallery of Australia.
Storytelling In Tech
With Miri Rodriguez
Marketing and storytelling are important components of product development because they allow companies to reach their audience and share their message. Miri Rodriguez explained what storytelling is and its role in brand development. Miri is the author of the book Brand storytelling: Put Customers at the Heart of Your Brand Story.
Building The Bridges To Security
Author
// Miriam Fernandez
Over the years, I have solely resided in IT (Information Technology) organizations, until now, where I work in a more evolutionary function. My achievements have directly supported the businesses that depend on IT to run. Core competencies include engineering and administration of the network backbone, plus UNIX servers supporting the IT Infrastructure. These directly connect the IT environment to the business groups and functions.
ORGANIZATIONAL INTELLIGENCE: CYBERSECURITY AS A PERFORMANCE OPTIMIZER
Author // Rhonda
Farrell
Recent cybersecurity innovations in both technology and standards, set a new tone for organizations, allowing for cyber-intelligence to be capitalized on by focusing on continuous collection, analysis, policy enforcement, and remediation at multiple enterprise levels. Vast improvements in governance, risk, and compliance management follow.
Hidden Dangers Of Internet Of Things
Author
// Martha Daniel
Computer security has evolved over the past 25 years as innovative technologies embrace wireless telecommunication integrating information and data and connecting the world globally. I can remember in the early 1990s the announcement that the “Super Highway” was coming with the prediction that it was going to significantly change the way we do business, the way we live, and the way we work.
Colin Calls The Help Desk
Author // Elwood Scott
Colin Calls the Help Desk is a hilarious and relatable take on the absurdities of office life.
Follow Colin the Koala as he dives into a series of mandatory workshops to identify why people think there’s too many meetings, conflicting “work smarter” initiatives, and an IT Help(?) Desk who keep emailing him the login details to access his computer.
Q. I notice there’s a koala on the cover. Is this a book for kids?
A. Not if you ever want them to get a job. Colin Calls the Help Desk is a satirical look at the corporate life Our hero just happens to be a positive and perhaps slightly naïve koala.
Q. But aren’t koalas generally naked, drunk or spending their time sleeping or catching Chlamydia?
A. No, you’re thinking of Bryan from Accounting. Colin wears a suit, is sober, and excited to lean-in, add value and grab the low hanging fruit.
ALPHA GIRLS: THE WOMEN UPSTARTS WHO TOOK ON SILICON VALLEY’S MALE CULTURE AND MADE THE DEALS OF A LIFETIME
Author // Julian Guthrie
“In Alpha Girls, award-winning journalist Julian Guthrie takes readers behind the closed doors of venture capital, an industry that transforms economies and shapes how we live. We follow the lives and careers of four women who were largely written out of history - until now.
Magdalena Yesil, who arrived in America from Turkey with $43 to her name, would go on to receive her electrical engineering degree from Stanford, found some of the first companies to commercialize internet access, and help Marc Benioff build Salesforce. Mary Jane Elmore went from the corn fields of Indiana to Stanford and on to the storied venture capital firm IVP - where she was one of the first women in the U.S. to make partner - only to be pulled back from the glass ceiling by expectations at home.
Theresia Gouw, an overachieving first-generation Asian American from a working-class town, dominated the foosball tables at Brown (she would later reluctantly let Sergey Brin win to help Accel Partners court Google), before she helped land and build companies including Facebook, Trulia, Imperva, and ForeScout.
Sonja Hoel, a Southerner who became the first woman investing partner at white-glove Menlo Ventures, invested in McAfee, Hotmail, Acme Packet, and F5 Networks. As her star was still rising at Menlo, a personal crisis would turn her into an activist overnight, inspiring her to found an all-women’s investment group and a national nonprofit for girls.
These women, juggling work and family, shaped the tech landscape we know today while overcoming unequal pay, actual punches, betrayals, and the sexist attitudes prevalent in Silicon Valley and in male-dominated industries everywhere.
Despite the setbacks, they would rise again to rewrite the rules for an industry they love. In Alpha Girls, Guthrie reveals their untold stories.”
QUIETLY VISIBLE: LEADING WITH INFLUENCE AND IMPACT AS AN INTROVERTED WOMAN
Author
// Carol Stewart
“You don’t look like an introvert” was a statement made to the author whilst at a networking event, and she thought to herself, what on earth is an introvert supposed to look like...
Many misconceptions exist about what introversion is, and this was just one of them. These misconceptions can lead to people having an unfavourable, unconscious bias towards those who identify as introverts when it comes to developing talent in the workplace. The challenges women face getting to senior leadership roles is well documented, and for the introverted woman who, dealing with those challenges, along with the challenges many face as introverts, can make the leadership journey even more difficult.
However, just because someone is not loud and gregarious, it does not mean that they are not great, effective leaders. This book addresses many of the challenges that introverted women face as leaders and shows how these challenges can be overcome. Some of the challenges are due to the self limiting beliefs they hold about themselves, or they may be as a result of unfavourable bias and misconceptions about what introversion is, or they may be a combination of both.
Quietly Visible is written from the perspective of the lived experience of the author (herself an introvert), her clients, her research, and the many, many introverted women across the globe who regularly share their experiences and challenges with her.”
The Inner History Of Devices
Editor // Sherry Turkle
“For more than two decades, in such landmark studies as The Second Self and Life on the Screen, Sherry Turkle has challenged our collective imagination with her insights about how technology enters our private worlds.
In The Inner History of Devices, she describes her process, an approach that reveals how what we make is woven into our ways of seeing ourselves. She brings together three traditions of listening--that of the memoirist, the clinician, and the ethnographer. Each informs the others to compose an inner history of devices.
We read about objects ranging from cell phones and video poker to prosthetic eyes, from Web sites and television to dialysis machines. In an introductory essay, Turkle makes the case for an “intimate ethnography” that challenges conventional wisdom. One personal computer owner tells Turkle: “This computer means everything to me. It’s where I put my hope.” Turkle explains that she began that conversation thinking she would learn how people put computers to work. By its end, her question has changed: “What was there about personal computers that offered such deep connection? What did a computer have that offered hope?”
ALONE TOGETHER: WHY WE EXPECT MORE FROM TECHNOLOGY AND LESS FROM EACH OTHER
Author // Sherry Turkle
“A groundbreaking book by one of the most important thinkers of our time shows how technology is warping our social lives and our inner ones.
Technology has become the architect of our intimacies. Online, we fall prey to the illusion of companionship, gathering thousands of Twitter and Facebook friends, and confusing tweets and wall posts with authentic communication. But this relentless connection leads to a deep solitude.
MIT professor Sherry Turkle argues that as technology ramps up, our emotional lives ramp down.
Based on hundreds of interviews and with a new introduction taking us to the present day, Alone Together describes changing, unsettling relationships between friends, lovers, and families.”
IN SECURITY: WHY A FAILURE TO ATTRACT AND RETAIN WOMEN IN CYBERSECURITY IS MAKING US ALL LESS SAFE
Author // Jane Frankland
Women are fundamentally different to men and, when it comes to cybersecurity, one thing is certain. . .IF YOU’RE SHORT ON WOMEN YOU’RE LESS SAFE.
Women matter in cybersecurity because of the way they view and deal with risk. Typically, women are more risk averse, compliant with rules, and embracing of organisational controls and technology than men. They’re also extremely intuitive and score highly when it comes to emotional and social intelligence, which enables them to remain calm during times of turbulence – a trait that’s required when major security breaches and incidents occur. As cybercrime, terrorism and warfare is increasing, and the number of women in cybersecurity is declining, now is the time to take action.
By combining stories, interviews and data with practical advice, the golden rules and checklists, IN Security provides the means to turn things around. When you read this book you’ll understand why the numbers of women have fallen, along with strategies for attracting, identifying, and retaining more women in cybersecurity.
The
RISE
Of
THE CYBER WOMEN: VOLUME ONE: INSPIRATIONAL STORIES FROM WOMEN WHO ARE TAKING THE CYBER SECURITY INDUSTRY BY
STORM
Compiled by // Lisa Ventura
“The Rise of the Cyber Women” is a compilation of inspiring stories from women in the cyber security industry from all over the world who are pioneers and leading the way in helping to protect the world from the growing cyber threat.
Those who are included and featured in this book shared not only their stories but also their hints, tips and advice to women who are looking to pursue a career in cyber security or change their career path into cyber security.
Their tenacity and commitment to their careers in the cyber security industry is very impressive indeed. If you are a woman who is looking to make the move into the cyber security industry, you need to read this book.
If you feel that you are not good enough for a career in cyber security, you need to read this book. If you suffer from “impostor syndrome” which is holding you back from a career in cyber security, you need to read this book.
SECRETS OF SIXFIGURE WOMEN: SURPRISING STRATEGIES TO UP YOUR EARNINGS AND CHANGE YOUR LIFE
Author
// Barbara Stanny
“Quietly and steadily, the number of women making six figures or more is increasing and continues to rise at a rate faster than for men. From entrepreneurs to corporate executives, from whitecollar professionals to freelancers and part-timers, women are forging careers with considerable financial success.
In Secrets of Six-Figure Women, Barbara Stanny, journalist, motivational speaker, and financial educator, identifies the seven key strategies of female highearners: A Profit Motive, Audacity, Resilience, Encouragement, Self-Awareness, Non-attachment, and Financial Know-How.
Based on extensive research and hundreds of interviews, including more than 150 women whose annual earnings range from $100,000 to $7 million, Barbara Stanny turns each of the six-figure traits into a specific strategy for upping earnings. By rigorously finetuning them, readers can, step-bystep, climb the income ladder.”
HOW WOMEN RISE: BREAK THE 12 HABITS HOLDING YOU BACK FROM YOUR NEXT RAISE, PROMOTION, OR JOB
Author // Sally Helgesen and Marshall Goldsmith
Leadership expert Sally Helgesen and bestselling leadership coach Marshall Goldsmith have trained thousands of high achievers -men and women -- to reach even greater heights.
Again and again, they see that women face specific and different roadblocks from men as they advance in the workplace. In fact, the very habits that helped women early in their careers can hinder them as they move up. Simply put, what got you here won’t get you there . . . and you might not even realize your blind spots until it’s too late.
MULTILATERAL CYBER NEGOTIATIONS AND GENDER MAINSTREAMING: A COMPLICATED RELATIONSHIP
By Liliya Khasanova
The protests in Iran in the name of Mahsa Amini are one of many examples of how the advancement of technology enables us to speak up, spread the word, and learn about human rights violations. Online anonymity and, therefore, reduced accountability for gender-based violence affects the vulnerability of individuals. There is no doubt now that the internet has become the most consequential communication technology of the human rights era.
Femgineer
By Poornima Vijayashanker
“Poornima Vijayashanker started Femgineer in 2007 as a creative platform for sharing her experiences working as the founding engineer with Mint. com. Thirteen years later, the organisation has developed into an education company for tech professionals wanting to build software products and companies. The blog is built around the concept of sharing learnings to innovate and inspire, and covers topics such as hiring tech professionals and the benefits of putting the customer at the centre of product creation.
Their website also has a range of online courses covering technical skills improvement as well as soft skills such as communication.”
Empowering Women In Cybersecurity
By Joanne Fisher
Every woman in cybersecurity should be empowered. Cybersecurity innovation thrives on diversity of thought and background. And the cyber community needs more of both. We recognize every woman who continues to pave the way for change.
Always Sia Strike
By Sia
Sia’s data analytics engineering and growth online hub. I’m a senior data analytics professional with experience as a data ops and pipeline management lead; including data cleaning, wrangling, analysis, visualization, and storytelling. With extensive teaching experience and a love of learning, sharing, and writing, I’m interested in working on and finding solutions to challenging data.
Pointers Gone Wild
By Maxime Chevalier-Boisvert
“We don’t always think of it this way, but on modern machines, memory and pointers are an abstraction. Today’s machines have virtual memory, divided in blocks called “pages”, such that the addresses represented by pointers don’t necessarily map to the same address in physical RAM. In fact, mmap even makes it possible to map files to memory, so some of these addresses aren’t even mapped to RAM addresses at all.
Two weeks ago, I wrote about UVM, the small virtual machine I’ve been building in my spare time. This VM has a relatively low-level design where it has untyped instructions and pointers for instance. Generally speaking, I’ve done my best to design the VM to be fairly “conventional”, in the sense that most design elements are aligned with common practice and unsurprising. In my opinion, this is important because it keeps the design approachable to newcomers. Having a design that’s unsurprising means that new users don’t need to read a 100-page manual and familiarize themselves with new terminology to get something done.”
Black Girl Bytes
By Rizel
“In this tutorial, we will build a rock, paper, scissors game with GitHub Copilot. We will also explore GitHub Copilot, a cloud-based AI tool that assists users of various editors in suggesting lines of code and whole functions instantly. We will discuss how Copilot has redefined productivity for millions of developers, and the benefits it provides. This tutorial includes the use of CodeTour, a VS Code extension, that allows developers to create and follow a guided walkthrough of a codebase. Let’s get started!
What is GitHub Copilot?
GitHub Copilot has helped redefine productivity for millions of developers by introducing them to the magic of AI assistance. GitHub Copilot is a cloud-based artificial intelligence tool developed by GitHub and OpenAI to assist users of Visual Studio, Visual Studio Code, Neovim, and JetBrains by suggesting lines of code and whole functions instantly. With Copilot, you can write a regular expression or interact with an API for the first time without leaving your editor.”
Foregrounding Marginalised Voices On Peace And Security In Australia
By Dr Lisa Carson
“In this blog, WPS Coalition member Dr Lisa Carson makes the case for an intersectional and intergenerational approach to building peace.
The theme of this year’s International Day of Peace was ‘End racism. Build peace’. The day is observed by the UN General Assembly and is devoted to strengthening the ideals of peace with calls for a 24 hour ceasefire globally. As the UN highlight, ‘achieving true peace entails much more than laying down arms. It requires the building of societies where all members feel that they can flourish. It involves creating a world in which people are treated equally, regardless of their race’.
DEEPFAKES AS A SECURITY ISSUE: WHY GENDER MATTERS
By Agnes E. Venema
In some ways, deepfakes are to video what photoshopping is to images. Just like photoshopped images, some are created better than others. It involves the manipulation of videos in such a way that, when well-made, it is impossible to distinguish from an original video. Deepfakes can be created in roughly two different ways: image creation and morphing. Image creation is a process by which a neural network looks at faces and creates their own image based on the samples it has been given. An example of image creation is the website ThisPersonDoesNotExist.
Deepfakes created through morphing merge one face with another, or superimpose expressions of one face onto another, creating video. Combined with voice cloning or using voice actors, morphing can lead to incredibly realistic videos that are entirely fictitious, such as the deepfake of President Nixon delivering the speech that was prepared in case of a moon landing disaster. A distinction must be made between deepfakes and “cheapfakes.” The latter is the manipulation of existing footage by slowing down or speeding up certain sections to exaggerate part of the video or by selectively editing content. Both U.S. Speaker of the House Nancy Pelosi and U.S. journalist Jim Acosta became the target of cheapfake”
REFLECTING ON ONE VERY, VERY STRANGE YEAR AT UBER
By Susan Fowler
“As most of you know, I left Uber in December and joined Stripe in January. I’ve gotten a lot of questions over the past couple of months about why I left and what my time at Uber was like. It’s a strange, fascinating, and slightly horrifying story that deserves to be told while it is still fresh in my mind, so here we go. I joined Uber as a site reliability engineer (SRE) back in November 2015, and it was a great time to join as an engineer. They were still wrangling microservices out of their monolithic API, and things were just chaotic enough that there was exciting reliability work to be done. The SRE team was still pretty new when I joined, and I had the rare opportunity to choose whichever team was working on something that I wanted to be part of.
After the first couple of weeks of training, I chose to join the team that worked on my area of expertise, and this is where things started getting weird. On my first official day rotating on the team, my new manager sent me a string of messages over company chat. He was in an open relationship, he said, and his girlfriend was having an easy time finding new partners but he wasn’t. He was trying to stay out of trouble at work, he said, but he couldn’t help getting in trouble, because he was looking for women to have sex with. It was clear that he was trying to get me to have sex with him, and it was so clearly out of line that I immediately took screenshots of these chat messages and reported him to HR.”
BECAUSE I’M A GIRL
By Katie Burke
“I was promoted a few weeks ago, which was great. I got a lot of nice notes from friends, family, customers, partners, and random strangers, which was exciting. But it wasn’t long until a note came in saying “everyone knows you got the position because you’re a girl.” And in spite of having a great week at a great company with great people I love, that still stung, because it’s not the first time I’ve heard it.
You see, every woman who works in tech (heck, likely every woman on earth) hears “because you’re a girl” dozens if not thousands of times in her life.”