Women In Security Magazine Issue 17

Page 1

17

NOVEMBER • DECEMBER 2023

EMPOWERING WOMEN IN CYBERSECURITY: STRENGTH IN THE INDUSTRY IS GREATER THAN THE NUMBERS P10

THE PEOPLE YOU DESERVE, AND THE PEOPLE YOU NEED P62

DO WE NEED TO MODERNISE OUR APPROACH TO DIVERSE LEADERSHIP? P54

THE AUSTRALIAN WOMEN IN SECURITY AWARDS 2023 COVERAGE P99

W W W. W O M E N I N S E C U R I T Y M A G A Z I N E . C O M


FROM THE PUBLISHER Strength in numbers: empowering women in the security industry

E

very year I repeatedly hear the claim that

A WIDE SPECTRUM OF EXPERTISE

there are no women in security. Every year

The security landscape is multifaceted. It requires

my response remains unchanged: that

professionals with a wide range of expertise,

this claim is simply not true! Through my

from technical skills to policy development to risk

annual awards I witness hundreds nearly

assessment. Women, like men, possess diverse

thousands of remarkable individuals being nominated.

skillsets that can be harnessed to create a more well-

I observe the WiCyS and Cyber Women of the Year

rounded and versatile workforce. By embracing this

awards where numerous women actively participate

diversity, the security industry can tap into a broader

and receive nominations. The AWSN, WiCyS,

pool of talents, enabling the creation of teams that

WISECRA, ASIS International and ASIAL networks are

can effectively address a variety of challenges

teeming with women, raising several questions.

and scenarios.

Is the real issue the lack of women in the industry,

FULFILLING AND IMPACTFUL CAREERS

or our failure to showcase them? Are we allowing

The demand for skilled security professionals is

their contributions to go unnoticed, and if so, why?

higher than ever before as the world becomes

Are we not working together sufficiently to deliver a

increasingly reliant on digital technology. Both

united front?

women and men have the potential to enjoy fulfilling and impactful careers in this dynamic

The importance of a diverse workforce should

field. Encouraging more women to join the industry

not be underestimated. The security industry in

not only helps address the gender gap but also

particular stands to benefit immensely from the

enriches the industry with a diversity of backgrounds,

presence of more women within its ranks. Beyond

experiences and perspectives that ultimately lead to

simply achieving equality, increasing the number of

better outcomes.

women in the security workforce is undeniably good for business. It fosters innovation, leadership and,

EMPOWERING WOMEN IN LEADERSHIP

ultimately, the industry's ability to safeguard against

While progress has been made, there is still a pressing

evolving threats.

need to elevate women to leadership positions in the security industry. It is not enough to focus solely on

DIVERSITY AS A CATALYST FOR SUCCESS

attracting women to junior roles; the goal should be

Diversity fuels innovation by bringing together unique

to create pathways for women to reach senior ranks,

perspectives, experiences and ideas. In the realm of

enabling them to shape the industry's direction and

cybersecurity, where threats are constantly evolving

policies. They need to have the seniority to foster

and becoming more sophisticated, diverse viewpoints

environments that support work-life balance and

are essential for developing comprehensive strategies

career advancement, and that offer opportunities for

that can anticipate and respond to these challenges

women to return and continue careers after taking

effectively. Having more women in the workplace

time off for family‑related reasons.

introduces a wealth of fresh insights and approaches that can greatly enhance the industry's ability to stay ahead of threats.

2

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Abigail Swabey

AMPLIFYING VOICES AND SHOWCASING SUCCESS Elevating women's voices within the security industry is crucial for driving change. It is essential to highlight the achievements and successes of women in security, to showcase the incredible impact they have on protecting critical networks, data and individuals. By doing so we not only inspire the next generation of female security professionals but also attract a broader range of talents to the field.

A COLLECTIVE EFFORT FOR A STRONGER FUTURE Increasing the representation of women in the security industry is not just a matter of gender equality; it's a strategic imperative. We have a collective responsibility to ensure the industry benefits from the full spectrum of talent available. By fostering an inclusive culture, providing mentorship, offering training and development opportunities and advocating for policies that support work-life balance we can create an environment in which both women and men thrive.

"When we learn how to work together versus against each other things might start getting better".

Abigail Swabey PUBLISHER, and CEO of Source2Create www.linkedin.com/in/abigail-swabey-95145312

aby@source2create.com.au

I S S U E 17

WOMEN IN SECURITY MAGAZINE

3


CONTENTS

2

INDUSTRY PERSPECTIVES

FROM THE PUBLISHER

EMPOWERING WOMEN IN CYBERSECURITY: STRENGTH IN THE INDUSTRY IS GREATER THAN THE NUMBERS

COLUMN Victim blaming

14

Why you will fail if you stand alone

42

Strength is greater in numbers 44

10

Planning for healthy screen time limits

66

WHAT’S HER JOURNEY?

Mariska Scriba

16

Susan Ajay

19

Christina Dell

20

Alex Penna

22

Hannah Rapetti

28

Florence Araniego

32

Ailie Houlihan

36

THE 86 LEARNING HUB

A simple way to solve cybersecurity skills shortage

46

Life and career can thrive together Practical steps to support women’s return to the workforce

50

Do we need to modernise our approach to diverse leadership?

54

All things mentors — advantages, what to look for and why

56

Why companies should make it easier for women to return to the cyber workforce after a career break 58 Need for simplification of data breach reporting requirements

60

The people you deserve, and the people you need

62

We’re all in this together: how female colleagues can keep new mothers connected to their cyber careers

64


NOVEMBER • DECEMBER 2023

FOUNDER & EDITOR Abigail Swabey

ADVERTISING Abigail Swabey Charlie-Mae Baker

99 2023

#2023WISAWARDS

81

THE AUSTRALIAN WOMEN IN SECURITY AWARDS 2023 COVERAGE

TURN IT UP 90

JOURNALISTS David Braue Stuart Corner

SUB-EDITOR Stuart Corner

DESIGNER Rachel Lee

Source2Create Pty Ltd is the publisher of this magazine and its website (www.womeninsecuritymagazine.com). AWSN is the official partner of Women in Security Magazine

OFF THE SHELF 92 ©Copyright 2023 Source2Create. All rights reserved. Reproduction in whole or part in any form or medium without express written permission of Source2Create is prohibited.

STUDENT IN SECURITY SPOTLIGHT Katie Perry

70

Mance Hung

76

Jennifer (Osato) Egbuliese

77

Nashra Fayyaz

78

SURFING THE NET 96


ASSOCIATIONS & GROUPS SUPPORTING THE WOMEN IN SECURITY MAGAZINE

07

08

MARCH • APRIL

IN 2022, YOU CAN NO LONGER TAKE SECURITY WORKERS FOR GRANTED P10-13 AS THE SECURITY THREAT MORPHS, DEFENSIVE TEAMS MUST CHANGE TOO

MAY • JUNE

WHO RUNS

P76-79

20 22

IF YOU CAN’T SPEND YOUR WAY TO GOOD SECURITY THIS YEAR, TRY FOCUSING ON YOUR PEOPLE P94-97

YEAR OF THE SECURITY WORKER

W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M

the

WORLD W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M


OFFICIAL PARTNER

SUPPORTING ASSOCIATIONS


Big Picture Easy Reliable No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY!

charlie@source2create.com.au

aby@source2create.com.au


Connecting - Supporting - Inspiring

AS A FORMAL NETWORK MEMBER, YOUR CONTRIBUTION ENABLES US TO BUILD A STRONGER FUTURE

With an affordable annual fee, AWSN members will have access to discounts on programs and industry events, the membership Slack space, post or share job opportunities, and receive our monthly and any special edition newsletters.

Memberships are now a 12-month cycle Corporate packages available Learn more at www.awsn.org.au/members/join/


LISA VENTURA

EMPOWERING WOMEN IN CYBERSECURITY: STRENGTH IN THE INDUSTRY IS GREATER THAN THE NUMBERS by Lisa Ventura MBE, Founder, Cyber Security Unity Limited

I

n the ever-evolving landscape of cybersecurity the

for roughly 24 percent of the global cybersecurity

role of women has gained significant attention

workforce. However, the study found more women

in recent years. Despite the progress there is

than men holding higher levels of education—master’s

still a gender gap in the industry with women

degrees and above—and gaining leadership positions

underrepresented in many cybersecurity roles.

in increasing numbers.

However, women’s contributions to the field is far

Furthermore, a higher percentage of women than men

greater than the numbers suggest. The unique

working in cybersecurity are reaching senior positions

qualities women bring to the table strengthen the

such as chief technology officer (seven percent of

cybersecurity industry, ultimately shaping a more

women versus two percent of men), vice president of

diverse, innovative and effective industry.

IT (nine percent versus five percent), IT director (18 percent versus 14 percent) and C-level/ executive (28

10

THE STATS DO NOT LIE: MORE WOMEN ARE NEEDED IN CYBERSECURITY

percent versus 19 percent). The figures show women

According to the Cybersecurity Workforce Study,

generally more educated and younger than their

a report commissioned by (ISC)², women account

male counterparts.

W O M E N I N S E C U R I T Y M A G A Z I N E

forging paths to management, and those doing so

N O V E M B E R • D E C E M B E R 2023


F E A T U R E

Forty four percent of men in cybersecurity hold a post-graduate degree compared to 52 percent of women. Nearly half the women cybersecurity professionals surveyed were millennials, 45 percent compared to 33 percent of men. In contrast, Generation X men make up a bigger percentage of the workforce (44 percent) than women (25 percent). In addition, according to the report, women working in cybersecurity account for 24 percent of the overall workforce globally. It is clear more needs to be done to attract women into the cybersecurity industry.

OVERCOMING THE CHALLENGES FACED BY WOMEN IN THE INDUSTRY

training staff and conducting regular security audits

All cybersecurity workers face challenges in their day-

can suffer. Cybersecurity professionals—often already

to-day work, whatever their gender. Some companies

in high demand—may find themselves overstretched

mitigate these challenges through a serious

when attempting to safeguard digital assets without

commitment by top management to the creation

adequate funding. Consequently, organisations

of a strong cybersecurity culture. However, many

become more susceptible to breaches that can have

organisations still view cybersecurity as more of a

far-reaching impacts. Belatedly they can underscore

chore, or do not realise that cybersecurity is critical.

the urgent need for a strategic shift towards recognising cybersecurity as a critical investment

In another recent report the World Economic Forum

rather than a business cost.

ranked cybersecurity attacks as the fifth highest risk to doing business around the world, and number one

The recruitment of skilled cybersecurity professionals

in North America. It identified some of the challenges

The recruitment of skilled cybersecurity professionals

faced by cybersecurity teams as:

has emerged as a pivotal challenge in today’s digital landscape. With the exponential growth of cyber

Inadequate funding

threats and the increasing sophistication of attacks,

Organisations often grapple with poor cybersecurity

organisations are in constant pursuit of experts

budgets. As the digital landscape grows increasingly

who can safeguard their digital assets effectively.

complex and cyber threats become more

However, the demand for these professionals often

sophisticated, under-resourcing cybersecurity

outstrips supply, resulting in a cybersecurity skills

initiatives can have dire consequences. Inadequate

gap that creates significant risks to industries across

budgets hinder the implementation of robust security

the board. Organisations face intense competition

measures, leaving organisations vulnerable to cyber

to attract and retain the specialists who play pivotal

attacks that can lead to data breaches, financial loss

roles in fortifying defences, detecting vulnerabilities

and reputational damage.

and responding to breaches.

Underfunded cybersecurity has impacts across

To address the shortage of skilled cybersecurity

multiple facets of an organisation. With limited

professionals, organisations must adopt a

financial resources, crucial components such as

multifaceted approach. Attracting top talent

investing in cutting edge security technologies,

necessitates not only competitive compensation

I S S U E 17

WOMEN IN SECURITY MAGAZINE

11


packages but also an emphasis on professional

only a technical endeavour but also a collaborative

development and a supportive work environment.

effort that requires the commitment of an

Creating a culture of continuous learning and

organisation’s entire workforce.

innovation can entice cybersecurity experts and help organisations cultivate their own internal talent pool.

Women polled in the (ISC)² Cybersecurity Workforce Study cited their top challenges as:

Collaboration with educational institutions, industry associations and cybersecurity certification programs can provide pathways for aspiring professionals to gain the requisite skills and knowledge. By acknowledging the critical role of these professionals

• low security awareness among end users (19 percent), • insufficient availability of cybersecurity professionals (17 percent),

and strategically investing in their recruitment and

• inadequate funding (16 percent),

growth, organisations can better fortify their defences

• lack of management support or awareness

and navigate the ever-evolving threat landscape.

(14 percent).

Keeping up with evolving cyber threats

If not addressed, any one of these challenges can

Keeping up with evolving cyber threats is an

weaken an organisation’s defences, making it more

ongoing imperative for organisations of all sizes

difficult to protect data and users.

and in all industries. The digital landscape is marked by continuous advancements in technology

DIVERSE PERSPECTIVES BREED INNOVATION

which inadvertently create new vulnerabilities for

Cybersecurity challenges are becoming more

cybercriminals to exploit.

complex and multifaceted by the day. To effectively address them it is crucial to have a diverse range of

Staying ahead of these threats demands a proactive

perspectives and approaches. Women often bring

approach that includes constant vigilance, adaptive

different viewpoints and experiences to the table,

strategies and a commitment to staying informed

which can lead to innovative solutions that might not

about emerging attack vectors and techniques.

be considered in a homogenous environment.

Organisations must prioritise threat intelligence and invest in advanced monitoring tools that can

Women possess unique problem-solving abilities that

detect and respond to threats in real time, mitigating

can complement the analytical and technical aspects

potential damage and minimising downtime.

of cybersecurity. Their capacity for empathy and collaboration can aid in understanding user behaviour,

A key component of an effective strategy to counter

essential for designing more secure systems. By

evolving cyber threats is a culture of cybersecurity

embracing and exploiting these diverse perspectives,

awareness and education. Such a culture must

the industry can better respond to dynamic threats

extend beyond the IT department to encompass all

and stay one step ahead of cyber criminals.

employees within an organisation. Giving employees practices enables them to serve as a first line of

EFFECTIVE COMMUNICATION AND SOCIAL ENGINEERING DEFENCE

defence against social engineering attacks and other

One of the most critical aspects of cybersecurity

forms of cyber manipulation.

is effective communication, both within teams and

a foundational understanding of cybersecurity best

with end-users. Women have been shown to excel

12

Regular training sessions along with simulated

in communication skills, which are essential to

phishing exercises and the dissemination of security

convey complex technical concepts to non-technical

updates can empower employees to recognise and

stakeholders. This skill is especially valuable to ensure

report suspicious activities promptly. Ultimately,

cybersecurity measures are properly understood and

effectively combating evolving cyber threats is not

implemented throughout an organisation.

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


F E A T U R E

Furthermore, social engineering attacks rely

Cybersecurity jobs are highly stressful. The

heavily on manipulating human psychology to

ever-changing technology and competitive work

gain unauthorised access. Women’s intuition and

environment may trigger imposter syndrome.

understanding of social dynamics can be a powerful

Imposter syndrome was discovered more than four

asset in identifying and countering such tactics.

decades ago and is still prevalent. There is even an

By prioritising the strength of these interpersonal

annual on 13 April. It can affect people at any level,

skills the industry can better safeguard sensitive

at any stage of their career, be they an entry-level

information and prevent breaches that try to exploit

cybersecurity professional or the CEO of a security

human vulnerabilities.

company. If you suffer from imposter syndrome, be kind to yourself and channel your inner strength to

RESILIENCE AND ADAPTABILITY

overcome it.

The world of cybersecurity is fast-paced and constantly changing. Rapid technological

FINAL THOUGHTS

advancements and evolving threat landscapes

Increasing the number of women in cybersecurity

require professionals who are resilient and adaptable.

is not simply about striving for gender balance.

Women have repeatedly demonstrated their ability

Women bring a unique set of skills, perspectives and

to thrive in dynamic environments by demonstrating

qualities that can significantly enhance the industry’s

strong resilience and flexibility in their careers.

effectiveness and resilience. By embracing and celebrating these strengths, the cybersecurity sector

These qualities are essential for responding to

can build a more inclusive, innovative and secure

emerging threats and staying ahead of cyber

digital landscape for everyone.

adversaries. The ever-changing nature of the field demands professionals who can quickly pivot and learn new skills, making women a vital asset in the

ABOUT LISA VENTURA MBE

industry’s ongoing battle against cyber threats.

Lisa Ventura MBE is an award-winning cybersecurity specialist, content writer and

MENTORSHIP AND ROLE MODELS

speaker. She is the founder of Cyber Security

Another powerful aspect of women’s influence in

Unity, a global community organisation dedicated

cybersecurity is the inspiration they offer future

to bringing together individuals and companies

generations. Women who have already made strides

who actively work in cybersecurity to help

in the industry serve as role models and mentors for

combat the growing cyber threats. Lisa is also a

those beginning their journeys. As more women enter

cybersecurity mindset and mental health coach

the field and ascend to leadership positions they can

and offers help and support to those affected by

empower others to follow in their footsteps, ultimately

stress, burnout, bullying/abuse and mental health

bridging the gender gap. We need more female role

issues in cybersecurity and Infosec.

models in the cybersecurity industry.

REMEMBER YOU ARE NOT AN IMPOSTER Imposter syndrome can be a huge problem and

www.linkedin.com/in/lisasventura

deter many women from considering a career in cybersecurity. Many women in the industry feel

twitter.com/cybergeekgirl

underqualified for a cybersecurity role, or think of themselves as frauds who are successful just

www.csu.org.uk

because of luck. Many also believe they do not have the same level of skills as the people around them.

www.lisaventura.co.uk

No matter what type of cybersecurity job you have, imposter syndrome is very common.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

13


AMANDA-JANE TURNER Cybercrime is big business, thanks to technical advancement and interconnectivity creating more opportunities. This regular column will explore various aspects of cybercrime in an easy-to-understand manner to help everyone become more cyber safe.

C O L U M N

Victim blaming A recent article in an Australian news outlet reported an executive calling for employees who repeatedly fall victim to phishing and other scam emails to be sacked. This bothers me. The victims of cybercrime are not to blame: the criminals are. Cassandra Cross, an associate professor in the School of Justice at Queensland University of Technology, wrote a powerful research paper on the subject in 2015, No laughing matter: Blaming the victim of online fraud, in which she discussed the need to counter the victim blaming narrative. It still resonates today when we read about companies sacking employees for being victims of cybercrime, or executives saying sacking is a legitimate response when an employee is repeatedly scammed. It is not. The employer has a duty of care to ensure

become the eyes and ears of the cybersecurity team,

the employee is appropriately trained, educated

they become part of the solution.

and aware of cybercrime. Keeping employees and businesses cybersecurity aware takes more than

One way to create a cybercrime aware culture in

mandatory annual cybersecurity awareness training

a business is to set up a cybersecurity champions

and occasional friendly phishing initiatives. It needs

network to help key cybersecurity messaging reach all

the creation of a culture in which being cautious

areas of the business.

about cybercrime and thinking about cybersecurity is second nature.

Sacking employees repeatedly scammed is not the answer. Continuous efforts to uplift and maintain the

Sacking employees repeatedly caught by cybercrime

cybersecurity awareness culture, avoid victim blaming

is also not helpful to a business’ ongoing cyber

and directly support impacted employees are the

resilience, because employees will stop reporting

required approaches.

suspicious cyber incidents for fear of repercussions. A cybersecurity team needs employees to be vigilant and to report suspicious cyber activity, near misses and successful cybercrime attempts. A cybersecurity team cannot be everywhere. When employees

14

W O M E N I N S E C U R I T Y M A G A Z I N E

www.linkedin.com/in/amandajane1

www.demystifycyber.com.au

N O V E M B E R • D E C E M B E R 2023


WHAT’S HER JOURNEY?


Mariska Scriba Head of Enterprise Security Services at MTN Business

M

y journey into the captivating

However, it soon became evident that I needed

world of cybersecurity was far

greater challenges, and a teacher suggested to

from predetermined. Raised in the

my mother that I be placed in a more stimulating

serene, close-knit town of Aberdeen,

environment. Thus, I embarked on a journey from

nestled in the heart of South Africa’s

my small town to stay with my grandparents in

Eastern Cape, my early years bore little resemblance

a city more than three hours from my parents.

to the fast-paced tech-driven career I would

This transition marked a pivotal moment in my

eventually pursue.

life, requiring me to adapt to a new way of living and learning, far from the familiarity of my small

Picture a place with just two tarred roads, gravel

town upbringing.

streets that outnumbered the paved ones, one clothing shop and one petrol station: the only ones

As my parents grappled with their own challenges,

for miles around. Growing up in this idyllic small town

including a strained marriage, my mother became

gifted me an upbringing where bicycles, tadpoles and

my anchor, working tirelessly to ensure I received

outdoor adventures took precedence over technology:

a quality education. We would see each other only

an upbringing where simplicity was the order of

on alternate weekends, and the separation tugged

the day. I cherished those days of playing outside,

at my heartstrings. My unwavering determination

catching tadpoles in the heart of town and savouring

to ease her burden drove me to study relentlessly. I

the delights of childhood with friends.

aimed to secure a bursary that would alleviate her financial worries. My hard work paid off when I earned

My family’s modest means meant we navigated life

academic honours and was awarded a bursary from

with financial constraints, but my parents, particularly

South African energy and chemical company Sasol,

my mother, worked tirelessly to provide for my sister

propelling me towards a career in geology. Yet,

and I. Despite the hardships, I excelled academically,

destiny had other plans for me, and I later chose a

earning high marks in both primary and secondary

different path.

school. I was even appointed the head girl of my primary school.

16

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

J O U R N E Y ?

FROM GEOLOGY TO IT TO CYBERSECURITY

commitment. This marked my transition from the

The uncertainty of my academic journey led me

comforts of my small-town upbringing to the bustling

to a gap year, a year of introspection and self-

metropolis of Gauteng, a city that felt foreign and

discovery. During this time I found my true calling,

intimidating. I found myself in the technical product

information technology. I pursued a National

development department, involved in crafting voice

Diploma in Information Technology at the Nelson

products. After two years at Telkom, my journey took

Mandela University in Port Elizabet, specialising

an unexpected turn when I joined a small international

in communication networks. My educational

mining company, 3D Laser Mapping. This role saw me

journey continued with study for a bachelor of

donning safety boots and helmets, working in open

technology degree in IT and communication

pit mines and traveling extensively. We specialised

networks, culminating in my graduation with

in selling 3D laser scanners and offering support to

honours and recognition as the best BTech student.

mines, helping them construct 3D models to predict

During my fourth year of study, I ventured into the

slope failures and enhance safety.

realm of information security, and my passion for cybersecurity was ignited.

Deloitte beckoned, offering an opportunity to contribute to the building of their cyber intelligence

I delved into cybersecurity with enthusiasm,

centre and to join their cyber threat intelligence

spending two more years completing my master’s

team. In just six months I found myself leading and

degree in information security. This period was

establishing the cyber threat intelligence offering. My

transformational. I conducted research, presented

tenure at Deloitte was marked by active involvement

findings at conferences and even embarked on

in various initiatives, from corporate netball teams

my first overseas visit, to a UK university. My

to organising social events and annual Secret Santa

grandmother, who had been a pillar of support and a

celebrations. My journey continued as I transitioned

motherly figure to me, passed away suddenly during

to Openserve, a division of Telkom, where I

this time, casting a shadow of grief over my journey.

assumed the role of senior manager, leading the risk

She had always encouraged me to complete my

intelligence team.

’book’, my dissertation, even though the complexities of academic life were foreign to her.

JOINING PWC PwC then entered the picture, inviting me to join

Financially, my journey was sustained by a bursary

their cybersecurity strategy team. Once again, I

from South African telco, Telkom, that funded my

embraced the opportunity, contributing my skills and

education and enabled me to purchase my first car,

expertise to this dynamic field. I remained engaged

symbolising my transition into a new phase of life.

in various initiatives, organising Secret Santa events

Scholarships, including those from the National

and spearheading the Women in Cyber initiative.

Research Foundation, Vodacom and the Nelson

Recently, mobile network operator MTN South Africa

Mandela Metropolitan University, further eased my

extended an invitation for me to serve as the head

financial burdens, for which I am profoundly grateful.

of department for their security products. In this, my

These scholarships, along with my unwavering

current role which I have held for about a month and

dedication, carried me through six years of intense

a half, I am building a dedicated team to oversee the

study, providing me with the opportunities and means

implementation of the company’s business product

to succeed.

security strategy, aligning our product roadmap with business goals and revenue commitments.

FROM ACADEMIA TO MINING Leaving academia behind, I was confronted with

Amidst these career milestones, I also embarked on a

the daunting prospect of having to spend two

personal journey. I met my husband, a man with two

years working for Telkom to honour my bursary

sons from a previous marriage who live with us. We

I S S U E 17

WOMEN IN SECURITY MAGAZINE

17


welcomed a beautiful daughter into our family during

BECOMING ENTREPRENEURIAL

the challenging times of the COVID-19 pandemic. The

My involvement in the cybersecurity community

pandemic brought with it an unexpected blessing: the

extends beyond my paid employment. I actively

ability to work from home, affording me the precious

participate in industry associations, reaping the

opportunity to witness the formative years of my

benefits of networking and knowledge sharing. I

daughter’s life.

also embrace my role as a mentor, guiding aspiring cybersecurity professionals and advocating for

Balancing the demands of corporate life with my roles

inclusivity and equality in the field.

as a wife, mother, daughter, friend and sister is no small feat. It necessitates a robust support system,

In the midst of my corporate journey, a new venture

especially when raising children. Thankfully, my

emerged: Bumboo Kids, an online business my friend

mother, who had relocated from Aberdeen to Gauteng,

and I founded. Bumboo Kids specialises in offering

has played a pivotal role in this support network. Her

unique baby and children’s products with a focus

presence has been invaluable, and we were even

on being family-oriented and providing exceptional

able to build a flat for her, creating a harmonious

customer service. Balancing this entrepreneurial

living arrangement.

endeavour with my career has been a rewarding challenge, and has added a new dimension to

As I reflect on my journey, I am grateful not to have

my journey.

encountered sexism in my career. Perhaps growing up amongst farm boys and pursuing a male-dominated

Looking ahead, I am eager to complete my PhD in

degree prepared me for the male-dominated

cybersecurity, a goal I had to postpone because of

environments I encountered later. Nevertheless, I am

my many other commitments. I am passionate about

heartened by the increasing presence of women in

contributing to the industry’s growth, addressing

the field of IT and cybersecurity, paving the way for

emerging challenges and advocating for the

more diversity and inclusion.

increasing presence of women in cybersecurity.

www.linkedin.com/in/mariskadelange/

18

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Susan Ajay Cybersecurity Analyst at Datacom

JOINING DATACOM The decision to pursue a diploma course at the Unitec

M

Institute of Technology, with the added bonus of an internship, was a turning point. And the opportunity y journey from electronics and

to gain hands-on experience at Datacom proved

communication engineering to a

invaluable, paving the way for a permanent role within

thriving career in cybersecurity

that organisation.

is one I believe will resonate with other women pursuing careers in

Balancing full-time work and studies was undoubtedly

cybersecurity. It speaks to the power of adaptation,

challenging, often demanding sleepless nights and

the strength found in balancing personal and

an unyielding commitment to learning. However,

professional commitments, and the boundless

the support and camaraderie of my colleagues

opportunities that come with a passion for learning.

and seniors at Datacom played a pivotal role in my success, reinforcing the importance of mutual

Having completed my bachelor’s degree in electronics

assistance within a team.

and communication engineering and while pursuing a master’s in signal processing, I found myself drawn

What I find most captivating about cybersecurity is its

to the dynamic field of cybersecurity. The decision

ever-changing landscape. Each day I am presented

to relocate to New Zealand added a new dimension

with new challenges and learning opportunities

to my journey, presenting both challenges and

and surrounded by a community of like-minded

opportunities that ultimately shaped my path.

individuals. While my commitment to family prevents me from contributing extensively to the security

A pivotal moment came during a seven-year career

community, I remain dedicated to continuous

break dedicated to raising my three children. This

learning, using every available resource to stay

pause, far from being a setback, provided the

updated on the latest developments in the field.

necessary time to plan my return to the workforce, armed with renewed determination and a clear sense

I believe my story is a testament to the potential that

of purpose.

lies within every individual, just waiting to be unlocked through determination and a thirst for knowledge. It is

The transition into cybersecurity was sparked by a

my hope that sharing this narrative will inspire others

chance encounter with a friend who had recently

to embrace their own journeys in the knowledge that

shifted careers from development. His experiences

no challenge is insurmountable.

and insights ignited a curiosity that led me down a path of rigorous self-driven research, encompassing

www.linkedin.com/in/susan-ajay-674a39239

everything from articles to online courses.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

19


Christina Dell Director Governance, Risk & Compliance

Christina Dell started her career with a bachelor’s

“I held various roles within the organisation, allowing

degree in forensic computing from Middlesex

me to explore multiple avenues and discern my true

University in the UK. She says a fascination with crime

passion. I transitioned from a software tester, where I

scene investigation, fuelled by shows like CSI during

candidly admit I struggled due to the repetitive nature

her formative years, initially inspired her to pursue this

of the work, to the quality team.”

field, albeit with some misconceptions. Her role with the quality team involved engaging with However, as she progressed through her academic

numerous other teams across the business, gaining

journey, Dell found herself drawn more towards

insights into their operations and ensuring the delivery

auditing and framework compliance. After graduating

of high-quality, low-risk solutions. “I found this role

she took a position with a prominent organisation

incredibly fulfilling as it allowed me to make a tangible

in London that offered a 12-week graduate program

impact across the organisation,” she says.

encompassing software testing, development and business operations.

And it led to Dell to make a serendipitous transition into information security. “I mentioned my educational

She was assigned to the software testing branch and

background and my genuine enthusiasm for security,

within the first four weeks of starting the program

and I was promptly offered a role to enhance the

had obtained an International Software Testing

security operations within our business.”

Qualifications Board (STQB) certification. She left

20

the company and secured a contractor role at a

A MOST CHERISHED EXPERIENCE

transportation technology company, initially as a

She adds: “This role, which I hold in the highest

software tester. She says her time there represented a

regard, remains one of the most cherished

significant chapter in her career.

experiences in my career. If it weren’t for a relocation,

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

J O U R N E Y ?

I would likely still be with that organisation. I forged

Those qualifications include: the ISO 27001 Lead

lasting friendships with exceptional colleagues. One in

Auditor certification along with certifications in ISO

particular has become a lifelong friend.”

9001, ISO 22301, ISO 20000-1, ISO 14001 and the Payment Card Industry Data Security Standard (PCI-

After relocating Dell took a role in a financial

DSS). She has also obtained additional qualifications,

services company as risk and compliance manager

including CISM, Practitioner in Cloud Security, Splunk

but within a year had transitioned to become the

certification, and Azure Fundamentals.

information security manager, which brought unexpected challenges.

MENTORING GIVEN AND RECEIVED Mentoring looms large in Dell’s career. She says one

She was only two weeks into this role when the

mentor played a pivotal role during a particularly

newly appointed CISO departed, leaving her to lead

challenging phase of her professional journey. “I was

a newly formed team in the midst of the COVID

endeavouring to establish a new business unit within

pandemic. “This period stands out as one of the

an organisation that initially showed little interest

most challenging in my career, as I assumed the

in the idea. I engaged in a daily battle to help them

responsibilities of CISO, information security manager

recognise the value of this initiative and my mentor

and cybersecurity manager,” she says.

played a crucial role in providing support during board discussions, offering invaluable market insights,

After the pandemic Dell felt in need of a change and

assisting with managing operational expenditure and,

took up her current role as director of governance

above all else, providing unwavering friendship.”

risk and compliance at a leading cybersecurity consultancy firm.

Dell now serves as a mentor to aspiring cybersecurity professionals, and says the role gives her immense

She says the role involves, internally and for

satisfaction. “I am deeply committed to mentoring

customers, analysing data to identify potential

because I am driven by the goal of guiding

compliance gaps or emerging risks that need to be

newcomers in the field to ensure they start on the

addressed along with developing and implementing

right path. My strong desire to encourage women to

policies and procedures to enhance governance

pursue careers in cybersecurity has led me to believe

and compliance.

that mentoring is one of the most effective ways for me to make a meaningful impact in this regard.”

Dell also needs to keep up to date with the latest regulatory changes and update internal and external

Dell also wants to make a wider impact on the

methodologies as required. She says one of the

business world, saying she is “driven by the

biggest challenges in her role is staying compliant

ambition to engage with diverse businesses and

with the ever evolving laws and regulations of the

boards as a non-executive director with the aim of

UK’s complex regulatory environment.

contributing to the formulation of their strategic direction and ensuring alignment with best practices

“In my current role, having a comprehensive

in cybersecurity.”

understanding of auditing methodologies and best practices across multiple frameworks has proven instrumental in assisting our clients,” she says. “It

www.linkedin.com/in/christina-dell-51037143

enables me to provide consultancy with a solid foundation in established principles, rather than mere personal opinions.”

I S S U E 17

WOMEN IN SECURITY MAGAZINE

21


Alex Penna Software Developer at Atlassian

A

cybersecurity: she’s a software developer

A CHARITABLE INTRODUCTION TO CYBERSECURITY

at Atlassian. She has another, voluntary,

It was her GPN role that got Penna interested and

role to which she devotes much time

involved in cybersecurity, in 2022 when GPN decided

and energy, as head of expansion

to add a security-focused project to its program

lex Penna’s day job is not in

and Sydney coordinator of the Girls’ Programming

line up.

Network (GPN), a program run by Tech Inclusion, a charity she cofounded with Renee Noble and

“One of the aspects of my role is helping develop

Nicky Ringland. GPN is dedicated to increasing the

concepts for new projects and ensuring tour content

representation of women and underrepresented

aligns with our pedagogy and GPN value,” Penna

groups in technology roles.

explains. “In 2022 we decided to add a securityfocused project to our line-up. I started working with

In her role at GPN Penna helps manage nodes in

the GPN Perth team to refine ideas and create a

Sydney, Melbourne, Perth, Canberra and Tasmania. “I

project that would allow our students to learn about

make sure they have the resources and support they

exploring the security behind passwords.

need to succeed and grow, and I help get new nodes set up,” she says, “I also run the Sydney node at the

“I wanted to create a project that gave the students a

University of Technology, which involves working with

better understanding of how password leaks happen,

the UTS team to organise the logistics of the events,

let them try out ‘hacking’ some encrypted passwords,

getting content ready, recruiting and managing our

and help them reach their own conclusions of what

volunteers, and being the primary point of contact

makes a strong password. So, I designed a project

throughout the event.”

that taught our students about password hashing and how, even with a strong hash, hackers can

It is no small task. Balancing her role at Atlassian

use rainbow tables and common passwords to

with her volunteer role at GPN is, Penna says, her

crack into accounts if they can get their hands on a

biggest challenge. “It is like having two full-time

leaked database.

jobs sometimes, and it can be pretty overwhelming.

22

I’m incredibly fortunate to have a lot of support at

“We created a dummy meme exchange website

Atlassian for what I do.”

with lots of accounts (each with a unique meme to

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

J O U R N E Y ?

keep the students excited about cracking into each

GPN was Penna’s first encounter with cybersecurity.

account), a database of account names and hashed

She joined Atlassian as an intern after graduating

passwords, and taught the students how to create a

and has been a software developer there for the past

program that would use a list of common passwords

five years.

to compare to the hashed passwords and give them a list of usernames and plain text passwords they could

“I’ve loved working at Atlassian and have got to work

use to log in to our website.”

on our data centre products, helping make admins’ lives easier for our biggest enterprise customers,”

TEACHING ONLINE SAFETY

she says. “More recently I have been working on

Penna also created an activity that got the students

growing one of our newest cloud products, Jira Work

working in groups, moving around and away from a

Management. Working with such amazing people on

screen. “For this project, I wanted to create an activity

various projects, products and problems is what I love

that complimented the security theme and taught the

most about working at Atlassian.”

students more ways to be safe online while keeping them in their hacker mindset,” she says.

Penna went to an all-girl high school, Kambala in Sydney, where she was the only girl in her year

“I developed some social engineering activities for

interested in programming. “Luckily, I had a fantastic

the students to work through to guess a specific

information processes and technology teacher and

user’s password. The students used fake social

inclusion teacher, Ms Borgert, who encouraged me

media posts, a phishing email attack and the victim’s

to pursue my interests in software development and

‘forgot password’ hint and security question to

found opportunities to further my interest through

gain information about the victim and crack into

the National Computer Science School Challenge and

their account.

Summer School at the University of Sydney,” Penna says. “Through these experiences, I found the Girls’

“We’ve run it in Melbourne, Perth and Sydney, and

Programming Network.”

the students have always loved it. I believe giving them a chance to see how easy it can be to get

In 2015 she attended a GPN event as a student

private and protected information and how that

and returned a year later as a volunteer when she

information can be used against them gives them

started university. “I loved the community of strong,

a much better understanding of how to be safe in a

supportive women. I loved feeling so strongly that

digital environment than just telling them about these

I belonged there, and I loved being able to make an

attacks. They get an intrinsic understanding of unsafe

impact on the students at our event,” she says.

common passwords because they have the skills to crack these accounts themselves.

COMMITMENT TO GPN And Penna became heavily involved in the

“I’ve seen the impact of this content on the kids

organisation. “I got completely hooked and found

firsthand; they have written plenty of feedback telling

more and more ways to get involved, starting as a

us how much more aware they are of digital security

tutor, then giving lectures, leading a room of tutors,

after the program. This has inspired me to want to

and leading areas of the event,” she recalls.

write more security-focused content for our events. I think it’s a fascinating area of computer science and

“Eventually, I was asked by the head of GPN Sydney,

one that’s very relevant to our students.”

Renee Noble, if I would like to help her double the GPN Sydney program by co-running the node with her.

ATLASSIAN SOFTWARE DEVELOPER

I was very honoured and excited by the opportunity.

Apart from a security unit in her bachelor of computer

Soon, Renee and I were running double the number of

science degree course at the University of Sydney,

events in Sydney.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

23


“Once the pandemic started and we had to stop

want to teach into attainable coding projects, using

events, we had the chance to take stock of where

different technical concepts for beginner, intermediate

GPN was and what we wanted to do to continue

and advanced students. Figuring out how to write the

to grow the program. We decided to cofound a

same program using only beginner-level concepts and

not-for-profit to take on running the program along

another version challenging to advanced students

with Nicky Ringland. During this time, we started

is an interesting intersection of technical and

the Melbourne node and I took on the challenge

educational challenges.”

of starting a new node in a large major city along with the GPN leadership team and the University of

She adds: “I’m working to develop more skills

Melbourne team.

around running the organisational side of the notfor-profit, writing policies and procedures with the

“I flew down to Melbourne a few times to help run the

other board members, understanding compliance

first couple of events and get the community started.

and requirements and solidifying our practices so

I soon found the same few volunteers coming to

they are stable and sustainable for years to come.

every event, growing in their passion and confidence,

I’m also always on the lookout for new concepts to

and I could see the community spirit I loved about

expose our students to, whether it’s a new technology,

GPN growing in this new node. I found a replacement

an area of computer science like security, or a hot

node coordinator and continued to support the

topic like AI.”

node remotely as it grew. They are now running very successfully and independently, and I’ve transitioned

Despite the huge amount of voluntary work Penna

to rerunning the Sydney node and growing it back to

does at GPN, it is not a one-way street: she says

where we were pre-COVID.”

she gains much in return. “Most people struggle with self-doubt, especially when you’re a minority in

NON-TECHNICAL SKILLS IMPORTANT

the industry. Certainly, in my career as a software

Penna might have got heavily involved in the technical

engineer, I’ve had plenty of times where I’ve doubted

aspects of cybersecurity teaching girls through

myself and my abilities. The thing that always helps

GPN, but says her most important skills in the role

me stay grounded and push past those feelings is my

are a combination of leadership, mentoring and

work with GPN. The community at every event is so

communication skills.

supportive and encouraging that it’s hard to hold on to those feelings of doubt.

“My current role has a lot of elements where I’m getting teams of volunteers on board and moving

OVERCOMING IMPOSTER SYNDROME

in the same direction, even when I’m not present at

“I think many of those imposter feelings can come

an event. Or I might be breaking down a concept we

from comparing yourself to those around you, and when you work at an amazing company like Atlassian, the people around you are also amazing, so the comparison is pretty rough. When I go to a GPN event, I’m surrounded by people at all different points in their journey, and it makes the comparison feel so silly, which it is. “I can see the high school students just learning to code, and it reminds me of myself when I was that age. The comparison reminds me of how far I’ve come. I see the university students learning

24

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

to find their confidence and hone their skills, and I remember myself at that age. I also see engineers who are further in their careers than I am, but rather than compare myself to them and feel lesser, they inspire me.” Also a major source of inspiration for Penna has been Renee Noble, the national director of GPN and CEO of Tech Inclusion, who she describes as “one of the most influential people in my growth at GPN,” and as a person. “She’s been an inspiration, a mentor and a friend for the last eight years. When I first joined the GPN community, she was running GPN Sydney and working on expanding GPN to the rest of the country. She has always encouraged the volunteers of GPN to try new things and take on new challenges, and I was no different.

J O U R N E Y ?

"Luckily, I had a fantastic information processes and technology teacher and inclusion teacher, Ms Borgert, who encouraged me to pursue my interests in software development and found opportunities to further my interest through the National Computer Science School Challenge and Summer School at the University of Sydney,” Penna says. “Through these experiences, I found the Girls’ Programming Network.”

“She pushed me to do more lecturing and leadership and continue getting more involved. Eventually, she and I were running GPN Sydney together, and I started getting more involved in the other parts of the

to these changes to be prepared to take them on and

program outside of just the events.

face the challenges that will come their way.

“Seeing the amount of work that Renee puts into GPN

“As more things in the industry change and evolve, the

inspired me and showed me what is possible when

content we are teaching the kids will also continue

someone with passion, skill and the right community

to change to stay relevant and give them the skills

behind them puts in the work to make something

they will need. The challenge is to make sure we are

spectacular happen. I don’t know where I would be

balancing keeping up with the times with teaching the

today without the guidance and support from Renee,

fundamentals so they have a solid foundation to build

and I can’t give her enough credit for the dedication

on when technology changes around them.

and energy she has poured into this program.” “Since kids are so plugged into technology and a

FUTURE PLANS

vulnerable part of our society, we need to ensure we

Penna sees much still to be done at GPN to keep

are giving them all the tools and information they need

up with rapidly evolving technologies. She wants

to be safe. Turning those security ideas into engaging,

to explore other programs GPN could introduce

hands-on experiences that become unforgettable

to support even more girls or minorities in the

lessons is something I’m passionate about and excited

tech space.

to explore further in the future.”

“Everything in tech is constantly evolving, whether it’s security, programming practices or emerging

www.linkedin.com/in/alex-penna-60048111b/

technologies like AI. Our students need to be exposed

I S S U E 17

WOMEN IN SECURITY MAGAZINE

25


A PROGRAM THAT CONNECTS, SUPPORTS AND INSPIRES FEMALE TERTIARY STUDENTS AND EARLY CAREER PROFESSIONALS EXPLORE A CAREER IN SECURITY. EXPLORERS WILL BE ABLE TO ACCESS MONTHLY WORKSHOPS, MENTORING OPPORTUNITIES AND INDUSTRY CONNECTIONS

"When women work together, they become a force to be reckoned with. Be part of a force for good in the security industry, by joining the AWSN Explorers program today!" - Liz B, Co-Founder

Studying or an Early Career Professional in information security? Learn more at .awsn.org.au/initiatives/awsnexplorers/


Contact us today to find out how you can become an industry contributor, no matter the level of experience. reach out now www.womeninsecuritymagazine.com


Hannah Rapetti Cyber Security Analyst – Takedown Team at Proofpoint

C

OVID-19 disrupted the lives of millions,

FROM TEACHER TO LIBRARIAN

forcing many to re-evaluate their careers

It was Rapetti’s second major career shift. She initially

and explore options they might never

pursued a career in education, earning a bachelor’s

have otherwise contemplated. Thus it

degree in social sciences and art and taking a job

was for Hannah Rapetti.

teaching in middle and high school, but says: “While

With a passion for literature she had gained a Master

I enjoyed certain parts of being an educator, I soon realised it wasn’t my true calling.”

of Library and Information Sciences degree from the University of Southern Mississippi, graduated at

At Proofpoint, where she works today as lead

the top of her class and scored a job as supervisory

cybersecurity analyst on the Proofpoint Takedown

librarian of one of the largest libraries in the US Navy

Team, Rapetti appears to have found that calling. “I

Library Program. Then, at the peak of the COVID-19

truly enjoy my job and the highs and lows it comes

pandemic, she had to relocate when her husband

with,” she says. “To me my work is not just a job, it’s

gained a new role outside the military.

a source of fun and fulfillment. I often find myself so enthralled by the project or analysis I am focused on

“The pandemic left me with limited career

I lose track of time. The old saying ‘Do what you love,

opportunities, particularly within the library system,”

and you’ll never work a day in your life’ really applies

she recalls. “Realising the need to pivot to something

to how I feel about my job.

that would allow me to work from home, and encouraged by my husband, I decided to explore the

“I help protect companies by removing malicious

field of cybersecurity.

domains that can target their employees, partners and customers. This can occur through phishing

“To get my foot in the door, I pursued industry

emails that facilitate various types of cyber

certifications. The first major certification I went for

attacks, including malware. Our team operates as a

was CompTIA CySA+. With this under my belt, I had

managed service, working closely with our clients

the confidence I needed to start applying for positions

to identify and neutralise these threats as quickly

in the field—including for an open role at Proofpoint,

as possible.”

which I eventually secured.”

28

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

J O U R N E Y ?

Rapetti says she spends most of her day monitoring

you must be able to think creatively about what kind

the takedown queue, checking it for new tickets,

of evidence would best fit the situation to get the

following up on existing ones and ensuring customers

best result.”

are well-informed about the process and status of their takedown requests.

COMMUNICATION SKILLS NEEDED Her role can also be stressful when working with

“Getting the bad domains taken down is the best

customers during an ongoing attack. “Effective and

part of the job. Knowing that my work contributes

professional communication skills are vital in this

to protecting organisations and their customers is

kind of role,” she says. “We need to communicate

incredibly rewarding.

on a technical level with providers while simplifying our interactions with customers who may not be as

“When a new takedown ticket arrives, I investigate to

technical, providing support and updates throughout

verify whether the domain is malicious and actively

the process.”

targeting the customer. Throughout this process, I gather evidence from both internal and external

Rapettihas been in her role at Proofpoint for little

threat intelligence resources to support the takedown

more than a year and says she is pushing herself

request. This will then be sent to the domain service

to focus more on networking within the DNS

providers, such as the registrar, hosting provider and

abuse community “to continuously learn about

TLD provider.

the nuances that come with the type of service we offer.”

DOMAIN TAKEDOWN ROLE “Collaborating with various domain service providers

Down the track she would like to move into a people

is a critical, yet challenging part of my role because

management role through which she can help shape

different providers have distinct policies for handling

the services Proofpoint offers, but says: “It’s important

various types of domain activity. That is why

to me that I always have a technical role of some sort

maintaining a positive working relationship and

to better stay on top of the changes within this field,

meticulously following all abuse reporting guidelines

because I think knowing some of those technical

is crucial.

aspects can make a big difference in your supervisory style and how your team succeeds.

“When I am not directly involved in a takedown submission, I work closely with customers to monitor

“I am also very focused on networking right now,

ongoing domain or brand abuse threats. This involves

especially within the DNS abuse community, so I can

a bit of threat hunting, a substantial amount of

take everything I learn back to my team and further

investigative work and meticulously crafting reports

develop our overall skills. I am currently working

on my findings, which I then present to the customer.

towards gaining CISSP in my spare time.”

I enjoy these meetings with my customers because they allow me to learn about their company on a more

COMMUNITY INTEGRATION

personal level, enabling me to tailor the domain threat

She is also integrating herself into the wider

analysis work to their specific needs. Ultimately, this

cybersecurity community and pursuing additional

provides a strategic service that adapts as they do.”

qualifications. A friend told her about the Women in Cybersecurity Organization (WiCyS). She applied and

Rapetti says the role requires strong investigative

was accepted for its Security Training Scholarship,

and analytical skill to identify malicious domains

a multi-stage program that partners with the

and gather the right evidence to support takedown

SANS Institute to develop cybersecurity skills

requests, as well as creative problem solving skills,

through capture the flag events and SANS/GIAC

“because it can be difficult to prove the activity and

certification courses.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

29


“Through this program I completed three SANS

In turn, Rapetti acknowledges many who have helped

courses and tested for the corresponding certification

her on her cyber journey. They include Angie Denisiuk,

exams: GFACT, GSEC, GCIH,” Rapettii says. “Being a

the advanced cyber tactics and techniques lead at

part of this program also allowed me to travel to the

Corteva Agriscience. “Someone I look up to and go to

yearly WiCyS conference and compete in the capture

for career advice. She’s a strong-willed woman who

the flag competition there, coming first in my division.

isn’t afraid to stand her ground and get work done, and I admire that so much.”

“WiCyS and the security training scholarship program have helped me battle imposter syndrome, giving me

Also, her Proofpoint colleagues: Jen Nicastro, senior

more confidence in myself and my decision to switch

manager, threat intelligence, Kelsey Merriman, senior

careers. I’ve really enjoyed helping the latest round of

threat researcher, and Genina Po, threat researcher.

candidates for this program and following everyone’s

“These women have been wonderful about sharing

journey on LinkedIn.”

information, brainstorming ideas and making me comfortable in my role since I joined the Proofpoint team,” Rapetti says. www.linkedin.com/in/herapetti

30

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Source2Create Spotlight

Content Content allows you to establish, share, and strengthen your brand. It helps build relationships which is why we are shining the light on our content service. Content strategies don’t just define the goals your content is intended to achieve, but also the procedure, processes and governance required to get there. We can show you how to manage your content effectively. We can then use that content to attract, acquire and engage your customer and new prospects, deepening your relationships. What are you waiting for?

REACH OUT TODAY

charlie@source2create.com.au

aby@source2create.com.au


Florence Araniego Associate Consultant | Phriendly Phishing - Transformation and Growth at CyberCX

“Everything I learnt was new, even using Windows. I hadn’t used a PC for years because creative jobs generally opted for Macs. I did not have a single bit of cybersecurity knowledge in my being and yet there I was, sitting in the Academy amongst incredibly talented people. I could feel that huge confidence in myself decreasing.

W

“But I held my head high, and was open minded to learning new systems, new ways of thinking and new hen Australian cybersecurity

people. I have met plenty of great people in my life,

company CyberCX opened

but in the Academy, I feel I’ve met lifelong friends.

applications for its CyberCX

Even the youngest members I have become the best

Academy, set up to “train the

of friends with! In this industry I have only met the

next generation of cybersecurity

most supportive people. Age becomes just a number:

experts” it received more than 1500 applications

your whole self is what they appreciate.”

for the 10, salaried, positions available in its Sydney cohort.

FROM TRAINING TO FULLTIME CYBER ROLE After completing her Academy training Araniego was

One of the 10, making a leap into cybersecurity after

given a job in another CyberCX company, Phriendly

a lifetime in artistic pursuits, was Florence Araniego,

Phishing, as an associate consultant. “As the root

who describes herself as “a mature aged woman with

of threats start at a human level, we strive to create

absolutely no skill in tech or cybersecurity.”

important behavioural and cultural changes, not just for businesses, but for the individual in the digital

She was, she says, “super lucky” to have been

aspects of their lives,” she explains.

selected. “The Academy is a fantastic initiative for people like me who have no previous tech

“I’ve been assigned to work in business operations,

or cybersecurity skills. It involves an intensive

working closely with transformation and growth.

cybersecurity fundamentals module. Afterwards, you

In my team of two we assess projects and gather

are placed in a practice that best suits your skills.”

insights in the many ways our company can grow positively and sell effectively as a SaaS business.

It is hardly surprising, though, that she experienced

32

imposter syndrome, despite having strong self

“Setting goals and objectives is part of the

confidence in her previous roles. “Having been

transformation process. We create roadmaps for

accepted into the Academy, I was up against younger

our company to achieve as well as focusing on skill

peers who had come from computer science

development. We ensure our approach stays ahead

backgrounds, had learnt to code, or had some

of emerging threats to give our sales reps and leads

background in the IT industry. I didn’t. I spent my days

up-to-date information, because the threat landscape

staring out the window thinking, ‘why am I here?’

changes so often.”

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

J O U R N E Y ?

Araniego says a typical day at Phriendly Phishing

The influence of friends on Araniego’s language skills

includes collaborating with colleagues and staff

continued in high school. She learnt simple Japanese

from CyberCX. “I feel my role is what keeps the two

from a Japanese friend who lent her Japanese manga

companies connected. I gather insights from digital

comic books. “I didn’t understand what was going

forensics/incident response, cyber intelligence and

on, but the Japanese characters intrigued me,” she

industry leads through meetings, writing reports,

recalls. And in her twenties she went on to learn

presenting my information and researching. As

the language.

an associate new to these processes, it can be daunting at first, driving projects that involve high

Prior to joining CyberCX Araniego spent most of her

profile people, but at the end of the day a lot of those

working life in the creative industries. She says she

I collaborate with end up being very supportive of

was drawn to the arts after experiencing difficulties

my ideas.

with English that persisted into high school.

“I get to actively work on projects that involve different

DISCOVERING ARTISTIC TALENTS

departments all at the same time. One task involved

“I took an interest in making art because

working on phishing templates with our LEAD team

communicating through other means proved

and learning about social engineering, which I found

difficult. I also learnt to play the drums and guitar.

super fascinating. Phishing is such a common

Music, I guess, is a form of abstract language

occurrence. It affects literally everyone you know: your

through notes, and since it was an expressive way

family, friends, colleagues. There are different types

of communicating, I found it very familiar. Art and

of it: whale phishing, spear phishing, vishing (voice-

music became my whole life in high school, and they

phishing), smishing (SMS-phishing) and something

influenced me to take a path in the creative arts after

I’ve learnt recently, qshing (QR code-phishing). AI, as

coming in the top five percent in NSW for visual arts

much as it can help us in a myriad of ways, people will

during the HSC.”

always find a way to corrupt it.” After high school, Araniego took odd jobs in retail,

A CHILD MIGRANT

selling musical instruments and as a barista. She

Araniego was born in the Philippines, and arrived in

saved enough money to study film and landed a job

Australia at age six. “We lived amongst the villages

assisting in a small indie sci-fi film about aliens.

and lakes. I was the daughter of an incredible father who worked hard to give me and my siblings the best

“I soon learnt that working in creative jobs meant I

lives we could possibly have, and Australia was the

needed several day jobs to make ends meet, and boy

answer,” she says.

was it tough,” she says. “I lived on packet noodles to afford transport to my film jobs, which were either far

Started her education at Liverpool Public Primary

away or hard to get to by public transport. This wasn’t

School speaking no English, but learnt Auslan. “My

sustainable, and I left the film industry after three

first ever friend, Nicole, approached me after seeing

short years.”

my Sailor Moon pencil case,” Araniego explains. “She was deaf, and I learnt a lot of Auslan from her. It was

Wanting to learn more about the creative industries,

a great happenstance to meet her as she didn’t know

Araniego enrolled for a bachelor’s degree in painting

I couldn’t speak a word of English. I never saw Nicole

and drawing at UNSW and again found herself

after primary, and I wish I could tell her she meant

struggling financially. “Like film school, the people

a lot to me.” Many years later Araniego revived her

there seemed to have endless cash and live minutes

Auslan skills: in 2017 she gained a Cert IV in Auslan,

away from the university. I took solace in the few

focusing on the Sydney dialect.

friends I had who lived similarly to me, modestly and

I S S U E 17

WOMEN IN SECURITY MAGAZINE

33


we all worked a few jobs to afford art school. I met

“Murals don’t just happen overnight,” she says. “It

my partner there, and art school seemed so fulfilling,

takes months of planning, meetings over Zoom,

sharing the experience with someone like minded.”

getting artists to design and create over Zoom, staff digitising the designs and visualising this mural while

SUPPORTING PEOPLE WITH DISABILITIES

working from home, and everything else admin wise

Araniego attributes her interest in cybersecurity

that goes to fulfilling commissions for a world-class

to her final artistic role after 15 years in creative

gallery. This is all before the mural gets painted!

industries when she worked as an artist at Studio A, a Sydney-based art studio for adult artists living with

“Then it was two weeks during lockdown to paint in

disabilities. It was “the root of my curiosity for all

the gallery. We were on scissor lifts and everything.

things tech,” she says.

When it was finally over, for me, it truly was the most incredible part of my creative career, and a full-stop in

“This job taught me a lot about the world: how to

my life as a creative arts worker. After working almost

understand diverse people and their colourful worlds.

15 years in the creative industries I felt the need to

Communication was a huge part of this job, on top

learn something new.”

of art making, and I learnt how to work with different methods I was unfamiliar with.”

INTRODUCED TO CYBERSECURITY And along came her introduction to cybersecurity

As the pandemic hit, the studio was forced into using

and CyberCX in the form of her friend of many years,

digital technologies to keep functioning. “We all had

Mandara. “During the pandemic her and her sister,

to problem solve quickly, jump through many hurdles

Manasa, both took the time to learn something new:

to teach not only the artists, but their careers at home

they studied cybersecurity,” Araniego says. “Mandara

and the staff how to be a little more tech savvy to stay

then applied to work in strategy and consulting at

connected and to keep working,” Araniego says.

CyberCX and was successful. After knowing I wanted a change in my career. She recommended I apply for

“We had many commissions to fulfill, and I was

CyberCX’s Academy, and the rest is history.”

extremely grateful, given the art industry took a real negative turn with galleries closing. I felt this act of

Araniego describes the culture at Phriendly Phishing

problem solving is where my love for tech was really

and CyberCX as being extremely welcoming,

ignited, and I started creating art digitally with the

supportive and positive. “I haven’t once felt

artists.” This culminated in Studio A painting a 300

discriminated against. I can come to work with my

square metre mural at the Art Gallery of New South

pink hair and tattoos, and people just accept me for

Wales in 2020.

who I am without a fuss! “I am also surrounded by many hardworking women who continue to inspire me daily. It is an extremely inclusive workspace, and the company holds events weekly that celebrate diversity. I know it hasn’t been easy for women to enter this industry, and I thank them for paving the way. I have been incredibly lucky to land a position amongst these incredible people and wonderful culture. I am proud to say that I am now one of them.” Araniego’s diverse background may not seem an ideal preparation for a career in cybersecurity, but

34

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


W H A T ’ S

H E R

J O U R N E Y ?

she argues otherwise. “The creative arts are all

A FORMATIVE FATHER FIGURE

about conveying your ideas, even complex emotions

And Araniego says, unlike so many women, she has

and stories in a myriad of ways. Language is the

been supported throughout her life by sensitive and

foundation of communication, and learning Auslan,

creative men. “My dad will always be the source of

which is an incredibly visual way of communicating,

inspiration for my whole being. He taught me at an

has broadened my ability to connect with diverse

early age that the world can be a cruel place outside

groups of people.

of our safe home, and as such I learnt martial arts from him, and he taught me how to speak my mind no

“Gaining these credentials has taught me to structure,

matter what the situation.

engage and effectively communicate my thoughts and, importantly, to practice empathy. This ability

“If I even felt the slightest discomfort in a new job,

to convey messages powerfully has made me a

a new person I meet, I immediately try to disengage

versatile communicator.

as soon as possible. This gave me an almost kneejerk reaction, an intuition, to save myself from

THE POWER OF A DIVERSE BACKGROUND

uncomfortable situations. I saw the world from a very

“Even in my youth, when I was paid terribly being

different perspective, and for that I am grateful for his

a barista, I learnt so much about how to deal with

guidance. My father broke the social norms of rigid,

different people, which has given me the skills today

traditional masculinity. This in turn taught me how

to deal with a diversity of people.

deal with this world we live in, as all too often women deal with sexism, misogyny, and the unspoken

“Being able to problem-solve on the spot is something

societal pressures we experience daily.

I picked up from working in film. Working in film is extremely stressful and you need to figure out

“My partner is another incredible source of inspiration

problems quickly as they arise, and be always

to me. He, a creative himself, never once doubted

110 percent.

my shift into the tech world. In fact he encouraged it. I think, as a creative person, you get a sense of

“These traits might not seem to describe someone

the world around you in a curious, divergent way

who works in cybersecurity, but the very root of the

compared to non-creatives. Others in my position

threat landscape is a human problem, and as such I

would have people tell them it’s a risk, and they have

believe I was chosen by the CyberCX Academy purely

no experience, clouding their judgement.”

and simply for these skills of engaging with people and communicating information well. My role as

One of the first steps Araniego took after joining

an associate is all about collaborating with people

the CyberCX Academy was to join the Australian

and visualising information in a succinct way that

Women in Security Network (AWSN), a step she says

everyone can understand.

has given direction to her nascent cybersecurity career: “a sense of purpose, empowerment and

“The reason the Academy were choosing people from

inspiration to continue to become a strong woman in

diverse backgrounds—from nurses to OT workers,

cyber security.”

retail workers and yes, artists and creatives like myself—was to diversify the security workforce. They

She is now setting her sights on digital forensics,

need people with life experiences who see the world

security assurance testing and AI. “This world is so

from different perspectives, not necessarily with the

new to me that I am ready to take on anything and

ability to code or to build VMs. CyberCX wanted a

everything,” she says.

cultural and behavioural shift from this, and I was wide-eyed and ready to learn.” www.linkedin.com/in/florence-araniego-6aa09a31

I S S U E 17

WOMEN IN SECURITY MAGAZINE

35


AILIE HOULIHAN

WHAT'S HER JOURNEY: AILIE HOULIHAN Ailie Houlihan, a consultant with the Strategy and

As a trained nurse with bachelor’s degrees in nursing

Consulting Practice at CyberCX, is in a role very

and health management, Houlihan says it felt natural

different from the ones she spent years training for:

to pursue formal study to support her goal of making

nursing and healthcare management.

a career shift into cybersecurity. So she embarked on study for a master’s degree in cybersecurity and

The fact that she has a husband in cybersecurity

started researching roles in the industry. Then she

was a big factor in her making the leap. “We were

discovered CyberCX.

all at home [during COVID], two young children and day in, day out my partner would join us from his

“I remember being stopped in my tracks when I read

office beaming about the exciting things he was

the advertisement for the CyberCX Academy. ‘All

experiencing in his world as a cyber intelligence

training provided, no-experience needed, looking

analyst,” she recalls. “I remember being in the throes

for people with lived experience and soft skills to

of newborn/toddler life and thinking, ‘Look at this

complement.’ It felt like that advertisement had been

guy. He loves what he does, gets to enact change,

written for me,” she says.

and positively impact people’s lives, yet still be present with his family. I want that.’”

HER FIRST CAREER IN NURSING Houlihan grew up in a small country town and says

Houlihan started to wonder what the cybersecurity

nursing was a natural career choice. “Nobody else,

industry could look like for her and where she

including myself, considered an alternative career

might be able to use the skills she had honed as a

path. It was easy to get into, a guaranteed job at

registered nurse. “I realised that many of the skills

the other end and, by all accounts, would be a

I already possessed could be applied in this field - I

fulfilling career.”

had business management experience from my

36

previous studies and then all my soft skills built

She enrolled in a nursing degree course at Flinders

through nursing. This could really work!” she says.

University with her sights set on a nursing career,

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


but fate intervened. At the beginning of her final

Houlihan joined CyberCX as a member of

year she was diagnosed with a rare blood cancer.

its first Academy cohort and has been with the

The treatment left her immunocompromised and

company for a little over a year since graduating,

significantly unwell and unable to complete the

which she describes as one of her greatest

compulsory placement component of the course.

professional achievements.

“With fear of an unknown future and not wanting to

“I left a well-established career in nursing to pursue

lose the time I had already invested in study, I used

cybersecurity. There is nothing scarier than taking

what I had completed already to pivot into a Bachelor

a leap of faith of that magnitude. But I believed in

of Health Science, majoring in management,” she

myself and, given what I knew of CyberCX, I was

says. “This was my first taste of business thinking.

confident I was leaping into safe hands. Now with

I didn’t realise at the time, but this would be

a growing body of experience and learning behind

integral when I made my future decision to move

me, and a recent promotion, I know that this has

toward cyber.

been well worth any struggles.” As soon as she had completed the Academy and practice-specific

“I did well and enjoyed the business and

training, Houlihan went straight into client work.

management topics, but still felt a pull toward nursing, as it was what I had always envisioned.

“I don’t think I really felt I was working in security

Eventually, I was well enough to recommence and

until the end of my first project,” she says. “We

finish my Bachelor of Nursing, graduating with dual

received great feedback from the client and could

degrees. I then received a first-round offer at my

see the substantial impact our work would have for

hospital of choice for their graduate nurse program.”

them. This was such a rewarding experience.”

Houlihan successfully completed her graduate nursing year and found her way into the world of

APPLYING NURSING SKILLS IN CYBERSECURITY

anaesthetic nursing where she “trained and perfected

Houlihan also discovered that her years of

the craft of being an intermediary between patients

experience in nursing were valuable in her new role.

and the intimidating world of surgery.” She spent

“The key skills I have been able to leverage are my

most of her time in emergency operating theatres,

attention to detail, being able to prioritise and take

“working in the ultimate, fast paced, think on your

ownership of tasks, and my communication skills,”

feet environment.”

she says. “Nursing is highly technical and time critical, and requires the ability to concentrate, track

LOOKING FOR A CAREER CHANGE

evolving situations and make split-second decisions.

She then took a break from nursing with the birth of

Bringing those skills and applying them to a new

her first child, and developed a different outlook. “I

technical realm has been a core strength of mine.”

was already starting to think what else may be out there for me, but eventually returned to nursing. This

She says also that her people skills have proved

time, with the additional juggle of having a little one

valuable in her new role: “There is such an

and my priorities being elsewhere, I could feel my

unacknowledged ‘people’ aspect to cyber. Those

heart wasn’t in it anymore.

who secure our communities, protect data, systems, livelihoods and people ultimately need to care for

“I wanted to explore something else. I hoped to find

people. While cybersecurity may seem exclusively

something that provided a better work-life balance,

technical, its basis is human.”

where I could still feel that sense of fulfillment and that gave me the opportunity to help people and

At CyberCX, Houlihan works with team members

my community.”

from across the organisation to understand clients’

I S S U E 17

WOMEN IN SECURITY MAGAZINE

37


cybersecurity risks, define their current and target

FUTURE PLANS

state maturity and identify uplift opportunities. “We

“I’d like to work toward gaining experience with

consider strategic approaches to threat landscapes,

incident response and use my breadth of experience

maturity frameworks, best practice, and risk to

from a strategic point of view. There are no limits

provide contextual, targeted and prioritised outcomes

to the ways in which threat actors are targeting

for our clients.”

organisations, and that landscape is ever changing. I think being ahead of trends and understanding the

Outside of CyberCX, Houlihan is a member of

response mechanisms is vital for all fields of cyber.

multiple industry associations including the

Ultimately there is always more that can be done to

Australian Women in Security Network (AWSN), the

secure systems and protect people, which is what I

Australian Information Security Association (AISA),

will be striving to do.

and the Information Systems and Audit and Control Association (ISACA). “I engage most with the AWSN

“I can honestly say I have no regrets about the

which has been an amazing resource both as a

decision to pursue cybersecurity. There are of course

student and an early career member,” she says.

moments of high pressure, and crunch times when

“Being able to connect with others in the industry

you wonder if there will be enough hours in the day

while learning and being supported by likeminded

to get a project delivered. But nothing outweighs the

individuals has been a powerful tool.”

genuine interest, positive outcomes and fulfilment I have for the work I’m doing. Every day I still wake up

Now well established in the world of cybersecurity

grateful for the opportunities applying for this role

Houlihan says she plans to continue to grow and

and pursuing cyber security, has brought me.”

develop her technical knowledge and work to leverage her experience in managing critical, high www.linkedin.com/in/ailie-houlihan-97655a56

intensity situations.

2023

38

W O M E N I N S E C U R I T Y M A G A Z I N E

Thank you to our judges N O V E M B E R • D E C E M B E R 2023


Our Services Nurture Programs

Event Management

Magazines

Speaker Acquisition

Digital Marketing

Website Creation

Data Admin Services

Lead Generation

Programmatic

Podcasts

No job is too big or too small. Get connected and take control of your business success today!

REACH OUT TODAY

charlie@source2create.com.au

aby@source2create.com.au


NEW ZEALAND WOMEN IN SECURITY AWARDS 2023

Who will win

WOMENINSECURITYAWARDS.CO.NZ/2023


SPONSORS

CyberCX

WISAWARDS | #2023WISAWARDS | #2023WISAWARDS | #2023WISAWARDS | #2023WISA

3-FINALISTS

n?

PARTNER


CRAIG FORD Cyber Enthusiast, Ethical Hacker, Author of A hacker I am vol1 & vol2, Male Champion of Change, Special Recognition award winner at 2021 Australian Women in Security Awards

C O L U M N

Why you will fail if you stand alone Cybersecurity is an interesting and challenging

We want to be lone wolves, protecting our

industry. It is one that many of us love being part of

businesses. We don’t need anyone’s help. We don’t

for many reasons, including its vibrant and engaging

share anything with anyone and certainly don’t need

community. We really do have some amazing minds

anyone telling us we are not doing something the

in this industry.

right way.

I have been part of the ICT and cyber worlds for more

Siloed cybersecurity needs to be a thing of the

than 20 years which, I guess you could say, makes

past. We can no longer sit behind a firewall with

me one of the old guard. Twenty years teaches you a

the old castle and moat setup. My network and my

few things: it gets you to sit back and watch what is

users probably cross over into your network and

happening around you.

your systems. Everything is becoming increasingly connected. We do not control the edges of our

It helps you learn from your mistakes and missteps. It

network. There are no edges.

teaches you not to take everything personally and to see things as a lesson. Okay, it also teaches you not

With the continuous blurring of the barriers between

to put up with people’s crap, to sometimes get straight

our digital lives and the real world, we cannot do

to the point and be dammed with the consequences.

security the way we used to. It just does not work, not

However, getting older does not mean everything we

only because there is no boundary, but because, as

do, we do better.

individuals and as businesses, we can no longer fight the constant battle for control and protection.

Many of you who know me would know I am a thinker. I sit back, watch, listen and absorb my

We need to come together and stand as one. We

surroundings. I am generally a quiet guy. Over the

need to be an army working together to help keep

years I have pushed myself to go beyond my comfort

all of us safe. I know this is easier said than done,

zone, and when I try, I am really great at talking or

but consider the alternative. If we keep doing what

communicating with the outside world. We all need

we have always done, we will keep seeing ever more

to push ourselves to do more and be better than we

breaches. More of our data will be spread across the

were yesterday, otherwise, we will become stagnant

dark web, and we will lose any sense of control.

and fade into the background. If, and I mean if, we can come together, we can

42

I have gone a little off track, but I will get to my

share the things that work. We can share resources

point in a minute. During the time I have been in the

and help push back the malicious hordes seeking

industry, I have noticed something, a common thread

to encrypt and exfiltrate our confidential data and

that many of you will have also noticed. Even though

ransom us all. Just think of us, collectively, as a

we have a vibrant community, an industry with so

Roman legion (I read an article from Simon Carabetta

many amazing minds to debate and challenge, many

in an earlier edition—In cybersecurity, it’s bellum

of us still want to go it alone.

romanum, or nothing issue No 12. Go back and find

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


dotm.com.au/ Join Today for FREE

it. It’s a good read). As individuals we may be good

To NETWORK with other like-minded people

fighters, we may be the best, but if we all lock shields with those next to us, we are stronger. If 1000 of us do that we create a wall that is almost impenetrable. This is what we need to think of as an industry: one in which we do not stand alone, we stand together as one. Together we are so much stronger. Together we can hold our ground and win the fight to protect our loved ones from the malicious hordes. So, what should you take away from this piece? It’s simple, don’t fight alone. Cybersecurity is a team sport. www.linkedin.com/in/craig-ford-cybersecurity

www.amazon.com/Craig-Ford/e/B07XNMMV8R

www.facebook.com/AHackerIam

To MEET prospective candidates for graduate programs To MEET prospective employers of graduate programs The club is for security professionals (present, future and past)

twitter.com/CraigFord_Cyber

I S S U E 17

WOMEN IN SECURITY MAGAZINE

43


KAREN STEPHENS Karen Stephens is the co-founder and CEO of BCyber. After more than 25 years in financial services, Karen moved into SME cybersecurity risk management. She works with SMEs to protect and grow their businesses by demystifying the technical aspects of cybersecurity and helping them to identify and address cybersecurity and governance risk gaps. She was recently named inaugural Female Cyber Leader of the Year at the 2023 CyberSecurity Connect Awards in Canberra.

C O L U M N

Strength is greater in numbers ONWARD AND UPWARD They say there is safety in numbers. In more than 25 years in financial services, I never had that luxury. I can count the number of my female corporate leader clients on one hand. The occasions on which I was the only female in the room were far too numerous to count. But “The Times They Are a-Changin.” Last week I was a member of a cybersecurity panel at the AIMA 2023 Australia Annual Forum. In itself, this might not be

bookstore would have any client data of interest.

newsworthy. What was newsworthy was that it was

“Hello Dymocks! Good to see you!”

AIMA’s first ever all-female panel on any topic. The focus of our panel session was cybersecurity. It was

I’m too old. If you want to change industries and jump

one of the most supportive and productive panels

into cybersecurity, you need to just give it a go. Will

I have had the honour of working on or with. The

it be hard? Yes. Will it be rewarding and challenging?

session included a discussion around myth busting

Also yes. As I have said many times to anyone who

in the cyber sphere, and I would like to continue

would listen: your real world experience combined

exploring this theme. I want to bust the myths

with proactive learning (including micro courses)

stopping females from joining what they perceive to

supported by networking will go a long way to help

be a ‘non-female’ cybersecurity industry.

you get a toehold in the industry.

Cyber only needs technical people. No! Just NO!

Lend a (proactive) hand. We cannot leave all the

What cybersecurity desperately needs are those who

heavy lifting to those wanting or trying to enter the

can translate the technical into practical applications

cybersecurity industry. Those of us who are already

in a way that SMEs can understand and afford.

there need to reach out to the newbies. If you see someone at a conference, tabletop or meeting you

Cybersecurity is a ‘boys club’. Nope! Personally,

have not previously met, reach out with a friendly

I have found this NOT to be the case. I have

smile. It might just help someone take their first small

encountered females at all levels, and all have been

step to helping us achieve the change we want.

very helpful when asked. Cybersecurity does not affect me. Sorry, I have some bad news for you. If the recent spate of cyber breaches has taught us anything it is that no one is immune and cyber is everyone’s responsibility. After all, who would have thought customers of a

44

W O M E N I N S E C U R I T Y M A G A Z I N E

www.linkedin.com/in/karen-stephens-bcyber

www.bcyber.com.au

twitter.com/bcyber2

karen@bcyber.com.au

youtube.bcyber.com.au/2mux

N O V E M B E R • D E C E M B E R 2023


INDUSTRY PERSPECTIVES


JALPA B

A SIMPLE WAY TO SOLVE CYBERSECURITY SKILLS SHORTAGE by Jalpa B, Cybersecurity Professional

STATE OF GLOBAL CYBERSECURITY SKILLSSHORTAGE

I want to take you back to 2014, when I was working

In its 2022 Cybersecurity Workforce Study (ISC)2

in network engineering. One day an email was sent

found 3.4 million more skilled cybersecurity

telling everyone to attend the office the following

professionals needed globally. This skills gap has

day. I was quite naïve and had no idea what was to

more than doubled since 2019.

come: all the roles in my immediate team of 22 were

MY STORY

made redundant. According to ISACA’s State of Cybersecurity 2022 report, it takes on average three to six months to fill

The helper in me wanted to support everyone around

a cybersecurity role. This has implications for the

me at this terrible time. I did just that. I sat with my

cyber industry. I’ve gathered statistics around the

team members listening to how they were feeling,

cybersecurity skills shortage and created the image

listening to their worries about an uncertain future,

below to provide some context to the seriousness of

having to feed family, etc. I consoled as many as I

this issue.

could, acknowledged it was a tough time, said we would get through it and that something better was

I’m passionate about the cybersecurity skills shortage

waiting for us all. Our workplace supported us by

because I experienced changing my career path. I

offering outplacement services, counselling and

transitioned to cybersecurity at a time when I had

resumé writing advice, and opportunities to apply for

no access to guidance such as from a coach or

open roles in other teams, etc.

mentor. I was not even aware of such roles. I’ve

46

moved into cyber and senior technical security roles

It was a long day, and when I reached home my

that required my transferrable skills and a change of

emotions took a U turn: I discovered I was going to

mindset. I believe this mindset change to be the key

be a mother. I was pregnant! My joy knew no bounds:

to addressing the skills shortage.

I had been waiting for this day for at least two years.

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

The next day, as I was getting ready for work, reality

etc. Sometimes we are not aware of these skills.

hit hard. I took my career seriously and was planning

At other times we discount our skills and fail to value

my life around it. I planned to be in a stable role

them at their worth. I encourage everyone to look

before having children so I could take a few months

beyond the words we place on our CVs to describe

maternity leave. Now, having lost my full-time role, I

our skills. Look beneath the surface and ask what

wanted to stay in the same company but there were

differentiates you, what you learnt from your last

no roles in network engineering on offer. My only

experience, and how some of those learnings and

option was to go for something different, or take a

skills can be put to use in a cybersecurity role.

short-term contract.

ROLE OF A MENTOR That was when I completed CCNA certification. In

Speaking to many of my mentees, I have learnt it can

doing so I also learnt about the fundamentals of

be quite challenging for cybersecurity aspirants to get

firewalls and the high-level network architecture

a foot in the door. They say finding a new role takes

needed to secure an organisation. There was an entry

a long time. Many experience their previous careers

level role in security engineering at my workplace.

being viewed negatively.

During the hiring process I was able to demonstrate my understanding of basic security fundamentals

Last year, I clearly remember three people reaching

and my transferable skills such as problem solving,

out to me to seek guidance on landing a role in

teamwork, communication and empathy. I got the

cybersecurity. I spent some time talking to each

role. So, from being told I would be made redundant,

them to understand where they were in their journeys

within two months I started work in a new role as a

and how could I assist. They had done Cert 4 in

level one security engineer. It has been a rewarding

cybersecurity, were coming from an unrelated work

career and I have not thought of changing.

background and were passionate about making a difference.

I believe all of us have some inherent skills and pick up other soft skills while going through life, for

When I asked them questions about their previous

example, when studying, working part time while

roles, I could see some of their skills were transferable

studying, being a vacationer or intern, on secondment,

and could add value to an organisation. When I

I S S U E 17

WOMEN IN SECURITY MAGAZINE

47


asked if they talked about their previous careers in

I suggest reflecting on the skills gained from previous

their interviews, all said they did not feel confident

roles and seeing what value they might add to a

doing so.

cybersecurity role. If unsure, ask someone who works in cybersecurity. Instead of saying you have

I saw a clear gap. Their previous careers represented

no experience in cybersecurity, you can focus on

an elephant in the room: no one wanted to

the transferable skills and tasks/duties you have

acknowledge their existence. Also, the hiring

performed which align with the soft skills required

managers placed much emphasis on certifications

for the role. Shine through the interview process.

and experiences related to cybersecurity. When

Talk about what makes you unique: what makes you,

candidates spoke about their previous roles, these

You! There is no need to invent or pretend. Prepare in

were seen as negatives because they did not reflect

advance and present the best version of yourself.

the cyber skills required for the job. Cybersecurity skills have always been in demand, Skills can be taught, attitudes not so much. My role as

and there are never sufficient skilled people available

a mentor became clear: to point out how my mentees’

to fill the required roles. As a result, it takes a long

soft skills could be used in various cybersecurity

time to fill these roles. According to the State of

roles to make a difference. They reported this advice

Cybersecurity 2022 report from ISACA, three to six

giving them more confidence in their skills because it

months on average.

enabled them to see how these skills could be useful in cybersecurity.

The skills shortage poses a risk to economies and people. To minimise this risk and fill more

When we start talking about our transferable soft

cybersecurity roles those of us who are already

skills the elephant in the room disappears. We

working in cybersecurity and in positions where

start seeing ourselves as unicorns, superheroes or

we are able to help others can help reduce the

anything we want to be.

cybersecurity skills shortage.

Here are some tips for those looking to upskill for the

Cybersecurity professionals can act as mentors to

IT security roles that will be most in demand in 2024.

help those seeking to break into cybersecurity. Often, I have heard from mentees that they are unaware of

• Networking. Network with people in various cyber

the depth and breadth of roles in cyber. This is where

roles to find out what their day at work looks like,

mentors can help with information on possible roles

which certifications or degrees were useful for

and what value particular transferable skills can add.

them to get their role, and to identify the soft skills which help them in their job. • Upskilling. This can be done in several ways depending on each individual’s preferred learning

There are several ways companies can work towards filling these vacancies on time and with expert professionals. Here are three tips.

method and time and/or budget available. It can include the online microlearning modules available

Again, these are simple steps but sometimes we

on various platforms, short course at TAFE, a

just need a reminder or a little nudge so we do not

full-fledged cybersecurity degree at a university,

overlook the basics.

and more. • Volunteering. This is an effective and fulfilling way

48

• Prioritise skill requirements when writing job

to meet professionals in the industry, connect with

descriptions. Organisations should take a long

them and add value to the cyber community. It

hard look at the skills required for a job to identify

requires time and a willingness to help.

skills that can be acquired through in-house

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

LEVERAGE TRANSFERABLE SKILLS TO ADVANCE CAREERS IN CYBERSECURITY. Current cybersecurity professionals wanting to advance their careers can use transferable skills to their advantage. I worked in security operations for seven years from 2014 to 2021. During the COVID pandemic I had some free time and I ended up identifying my long term career goals. I saw myself working in senior roles. So I wanted to get more varied experience in the different domains of cybersecurity. I realised I had transferrable skills that could help me gain such roles. I completed a couple of short courses in governance risk and compliance (GRC) and cybersecurity leadership. I applied for a job in security GRC, gained a role within a year and leveraged knowledge gained in previous roles and short-term courses in my new role.

DRAW ATTENTION BACK TO THE PROBLEM STATEMENT. We cannot ignore the cyber skills shortage. It is getting worse. I want to urge you all to approach it training, skills used in existing roles, and to write

with an open mind, with an intent to help change

better targeted job descriptions.

the status quo and create a more secure future for

• Look for candidates beyond IT. Employers should

everybody. Look beneath the surface of an applicant.

question if the role requires an IT degree. In some

It is like digging for gold. When a gold nugget is found

cases, it might be possible to hire a high potential

it looks rough, more like a rock. The dust must be

candidate with a solid academic track record

brushed off to reveal the shining gold beneath.

(even if in a different field), and then teach them on the job. Pay attention to the whole person not

I have moved into cybersecurity and into senior roles

just to certificates and skills listed in resumés.

by relying on my transferrable skills. I believe my

• Make it easier for workers to enter the

transition represents a key change in mindset needed

cybersecurity talent pipeline. Organisations can

to address the skills shortage. People looking to break

partner with government agencies and academia

into cyber and those looking to hire people need to

to remove unnecessary barriers that workers face

be more aware of transferrable skills in the hiring

when entering cybersecurity.

process and in career progression.

As individuals, cybersecurity professionals

www.linkedin.com/in/bhavsarjalpa

are enthusiastic about what they do, and their organisations need to recognise this and support them with the tools they need to succeed and to

‘Passport to a cybersecurity career’ Podcast

chart a path forward for the entire profession. Corporate culture can have a significant impact on an employee’s experience and happiness, which in turn affects the efficacy of their work.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

49


JO STEWART-RATTRAY

LIFE AND CAREER CAN THRIVE TOGETHER PRACTICAL STEPS TO SUPPORT WOMEN’S RETURN TO THE WORKFORCE by Jo Stewart-Rattray, Oceania Ambassador, ISACA

The field of cybersecurity in Australia is increasingly

And according to ISACA’s SheLeadsTech program:

receiving the attention it warrants. Most recently, the Federal Government’s announcement that it will frame a revised cybersecurity strategy around six ‘cyber shields’ to create a multi-layered defence against attacks was a positive step towards building a more

• Diversity efforts could net the global IT industry an additional $400 billion in revenue each year. • Only 22 percent of IT leadership roles are occupied by women.

protected nation.

• Only 13 percent of tech chief executive roles are

As development of our industry sector escalates, it

• When at least 30 percent of an organisation’s

filled by women.

50

provides fertile ground for continuing to address a key

executives are women, it can achieve a 15 percent

area that requires attention: gender diversity.

gain in profitability.

At the recent United Nations’ 67th session of the

There is no doubt the cybersecurity industry sector

Commission on the Status of Women, Secretary

has made progress to increase gender diversity. We

General Antonio Guterres said our granddaughters’

are having essential conversations about gender

granddaughters’ granddaughters, granddaughters

diversity and many organisations have prioritised

would be the recipients of the work we are doing now

DE&I policies to support women, in all their diversity,

to improve representation and involvement of women

during their cybersecurity careers. These activities

in the technology fields. That’s approximately 200-300

must continue, but I want to focus on some

years before true gender parity will be a given.

immediate and practical steps we, as an industry

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

sector, can take to ensure we attract skilled women

leave. For example, SheLeadsTech provides

back to the cyber workforce, post maternity leave.

comprehensive resources, services, online events and learning to help accelerate careers and provide

1. STAYING CONNECTED

development pathways for women.

The cybersecurity sector is growing rapidly, with new regulations and technical capabilities emerging

A major feature of the program is mentorship, a

frequently. A major challenge for many skilled

potentially valuable engagement during a career

women during maternity leave is staying abreast of

hiatus. Mentoring keeps women connected with

information integral to their continued growth and

other experienced professionals who can provide

professional development.

encouragement, advice and guidance.

I have met many female security professionals who

By actively supporting the individual needs of women

would appreciate the option of a maternity leave

on maternity leave, professional associations can play

program that allowed them to stay connected. This

an important role in contributing to women’s growth

could take the form of quarterly catch-ups, virtually or

and their retention by the sector.

in the office, enabling them to remain associated with peers, along with quarterly online or in-person training providing technical and industry updates.

3. PROMOTE WOMEN BEFORE MATERNITY LEAVE Not every woman in security aspires to lead teams

Not only would these initiatives enable women to stay

or seeks to become an elite professional. Many want

connected and help them make a smooth transition

to focus on developing existing skills and may even

back into their cybersecurity careers, they would also

consider sideways moves. Whatever their aspiration,

demonstrate a company’s commitment to women’s

if there is a promotion opportunity or a new role

growth and boost women’s motivation and loyalty.

available, making this happen before she begins maternity leave has significant advantages.

2. LEAN ON PROFESSIONAL ASSOCIATIONS Technology professionals’ associations can play a

This approach increases a woman’s sense of job

pivotal role in supporting women during maternity

security and may reduce anxiety during maternity

I S S U E 17

WOMEN IN SECURITY MAGAZINE

51


leave. It ensures women are recognised and rewarded

Each time a woman in cybersecurity is successfully

for their contributions, which boosts job satisfaction

fulfilling her career and life goals, whether they

and confidence. And it helps reduce turnover: a

want to gain technical expertise or achieve work-life

woman returning from maternity leave into a higher

balance, it inspires other women to do the same. The

position or a role she has aspired to is more likely to

power of role models to motivate and support cannot

stay with a company long-term.

be underestimated.

4. CHILD-FRIENDLY FACILITIES

Standing alongside and aligning with women through

Women who have opted to take maternity leave

a momentous phase of their lives ensures they

should feel welcome and included at industry

are supported, and fosters their loyalty. The long-

conferences and events during this period, should

term benefits for the cybersecurity industry are

they choose to attend. Enabling a creche facility or

immense and may positively impact the industry’s

feeding room at these events promotes inclusivity

overall performance.

and supports gender equality. I recently attended a conference where a nursing mother had to express milk in the toilet. Facilities such as a dedicated

ABOUT THE AUTHOR

nursing space not only promote inclusivity but

Jo Stewart-Rattray has over 25 years’ experience

enable women to attend important events and foster

in security. She consults in risk and technology

professional development.

issues with a particular emphasis on governance and IT security in businesses as a director of

Ultimately, support for women’s career goals

BRM Advisory. She regularly provides strategic

hinges on understanding each individual’s career

advice and consulting to the banking and finance,

trajectory and helping them advance it even during

utilities, healthcare, manufacturing, tertiary

maternity leave.

education, retail and government sectors.

www.linkedin.com/in/jo-stewart-rattray-4991a12

52

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


YOU E R A

INTEREST

E D?

Global Contributors

WANTED OUR NEXT ISSUE'S THEME:

Issue 18: The future of Women in Security

WAYS YOU CAN CONTRIBUTE: Contribute to one of our

editorial sections

What's Her Journey Career Perspectives Industry Perspectives Technology Perspectives Student in Security Spotlight

Run a listing for

any of the following

Submission Have a book? Deadline: Have a podcast? Nov 14th Have a blog? Have free training and learning opportunities available?

REACH OUT TO JANE@SOURCE2CREATE.COM.AU TODAY

www.womeninsecuritymagazine.com


FATEMAH BEYDOUN

DO WE NEED TO MODERNISE OUR APPROACH TO DIVERSE LEADERSHIP? by Fatemah Beydoun, CCO and Cofounder, Secure Code Warrior

The tech industry has endured more than a few

career pathways are perhaps viewed as out of reach

challenges over the past couple of years, with

due to unconscious bias or lack of support and

everything from post-pandemic economic headwinds

opportunities for growth. This outlook is changing,

to remote working and cultural shifts that are rapidly

and it is refreshing to see high-profile women like

changing the landscape. Despite this period of

Jen Easterly. Director of the US Cybersecurity and

constant re-evaluation, many companies continue to

Infrastructure Security Agency (CISA) in top positions

pay heed to somewhat dated ideas around diversity in

of influence in the global cybersecurity community.

the workplace. However, in the average enterprise it can still be The desire to attract more women into technical

difficult for women to achieve cut-through among

and leadership positions in the cybersecurity

their more visible male peers. The 2021 Census

industry has been a hot-button issue since I began

found the global situation is not much better, with

my career. While there have been many positive

approximately 24 percent of cybersecurity roles filled

developments, I remain curious about how we can

by women.

modernise our approach to creating a fairer and more equitable industry.

There are several factors keeping female representation low. These include interest in STEM-

54

MAKE SURE CAREER PATHWAYS ARE NOT ROADS TO NOWHERE

related roles likely not being as strong for women as

I am a firm believer in the notion that you “cannot

women and girls to participate in cybersecurity? If

be what you cannot see.” For many women in

environments are hostile, lack inclusivity and role

cybersecurity there has been a distinct lack of women

models, or fail to assign women to meaningful roles, it

visible in leadership roles, and some aspirational

is little wonder they remain a minority.

W O M E N I N S E C U R I T Y M A G A Z I N E

for men. That aside, what is being done to encourage

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

Every person should have viable options for growth,

My feelings on this are two-pronged. First, we should

and the diversity of thought, skills and perspectives

not be overlooking soft skills or their development

an inclusive leadership team brings to the table

in-house; they should be honed, promoted and

cannot be overstated.

valued across the board, and are key attributes of anyone looking to grow their leadership prowess.

QUOTAS (CAN BE) A RELIC OF THE LESS INCLUSIVE PAST

Secondly, such tasks should not be assigned to a

The kneejerk response to low diversity in leadership

job description.

woman by default, especially if they are not in her

or technical roles in this industry is typically to set a quota. While quotas have been instrumental in

In addition to technical roles for women, we must

creating positive change and correcting deeply

promote the value of less technical roles, which tend

ingrained gender imbalances, especially in tech, they

to be the entry point into the cybersecurity workforce

can be somewhat divisive if not used in the spirit of

for many women: their contributions are vital to

which they were once intended.

creating and executing optimal security programs.

Nobody likes to feel tokenised, or that they were

WE CAN ONLY MOVE FORWARD TOGETHER

elevated to a position for reasons not based solely

Like most things in life, mutual respect and

on merit. I can honestly say I have never worked in

empathetic collaboration can move mountains. To

an organisation where a formal quota was needed;

that end the support of men, especially those already

there have always been ideal female candidates who

in positions of influence and power, is vital to elevate

merited elevation to available higher level roles.

the role of women. Such men can coach, stand up in the face of gender-based inequality or injustice, and

Studies continue to prove a positive link between

advocate for those who struggle to be heard.

diversity and financial performance with one McKinsey report stating: “Diverse companies are

There are many changes on the horizon. To weather

33 percent more likely to have greater financial

them successfully, an inclusive approach to

returns than their less-diverse industry peers.” In

cybersecurity leadership initiatives is essential.

my experience, organisations that consistently elevate their diverse and female talent and create opportunities for star players who may not be typical

www.linkedin.com/in/fatemah-beydoun-b6555bb1

candidates for higher level roles achieve leadership diversity goals independent of any formal quota.

STOP TREATING SOFT SKILLS AS SECOND‑CLASS CITIZENS I am sure most women in the tech industry have a story to share of being nominated for ‘soft skill work’, almost by default. I have been the only woman working with a team of pentesters and, inevitably, whenever it came time to write up documentation, communicate with stakeholders or give a presentation, those tasks would end up on my desk.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

55


ASMITA GOVIND

ALL THINGS MENTORS — ADVANTAGES, WHAT TO LOOK FOR AND WHY by Asmita Govind, Consultant at Will You Hack IT The other day a colleague and I were chatting after

Beyond their evident skills, it’s their journey and the

work. There may or may not have been some drinks.

lessons they have learnt along the way that stand out.

We ended up talking about mentors. It got me

They have been through the mill, acquired invaluable

thinking, and I figured I would share my thoughts

insights and know the ropes of their domain. What is

on mentoring.

crucial is that a mentor is someone with whom you can openly discuss things like:

Mentors are like secret weapons when you’re trying to build your career. A mentor can be your manager,

• The stuff you need help with

a leader at your workplace, or even someone from

• Your big dreams

your family. But what they bring to your career

• Things you enjoy (and things you don’t)

development can be invaluable.

• The hurdles you’re facing

I’ve had a bunch of mentors over time. Some were

Most importantly, they keep you focused on the big

official ones from school or work programs. Others

picture while you tackle your daily grind.

were unofficial, such as super-smart colleagues who gave me killer advice whenever I needed it.

Your manager may not be your best mentor. It’s essential to be able to discuss these topics openly,

I once met someone who was a potential mentor

and not everyone is able to do so with their manager.

candidate, and I asked him to be my mentor for a time. That turned out to be one of the best decisions

Imagine having a CEO for your career journey. They

I ever made. (You know who you are, and I miss

help you plan, keep you on track, give you a push

our chats!)

when you need it and make sure you learn the right stuff to get where you want to be. (Mine have also

To me, a mentor acts as a trusted career navigator.

56

W O M E N I N S E C U R I T Y M A G A Z I N E

called me out when I have been lazy!)

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

HERE ARE FIVE THINGS I’VE LEARNED TO LOOK FOR: 1. Matches with your goals Peeking at a mentor’s resumé and job title can give you some good info. If you’re gunning to be a head surgeon at a top-notch hospital having a mentor who’s been there and done that is like striking gold. They’ve got the inside scoop on how to win. Just a heads-up, though: it’s best to steer clear of mentors who are competing directly with you. Open chats might take a backseat when rivalry is in the picture. 2. The right connections A fantastic mentor is not only a knowledge bank,

In a world where folks juggle a bunch of careers, the

they’re also a networking champion. Their contacts

idea is to get a different perspective to help you grow.

can be a treasure trove when they do not have all the

Their perspective, their style and how they do their

answers. Super mentors can even introduce you to

thing all count. A mentor is a quiet tutor who helps

folks who can accelerate your career journey.

you shape your path.

3. Skills that go everywhere

HOW TO ASK SOMEONE TO BE YOUR MENTOR

It is said the average person has at least five main

If there is someone you admire or would like to have

careers, and with careers needing to change and

as a potential mentor, all I can say is: just ask them.

adapt these days, acquiring skills that can be

Most people would be flattered, and genuinely open

deployed in multiple jobs is the name of the game.

to it if they were in a position to help. If they are not,

Look for mentors whose values, style, work ethic and

they will let you know, and possibly recommend

problem-solving mojo match yours. This way, you’ll be

someone else.

set to twist and turn with the ever-changing job scene. And, if they are rude about it, they are not the right fit 4. Problem-solving skills

for you anyway. The worst thing someone will say is

Acing problem-solving is a must. Learn how mentors

‘no’ which is really not that bad. So take a leap and

crack problems, handle hair-pulling situations and

just go for it.

shine like stars in their fields. These skills are the secret weapon you need to own your future.

Whether you’re chatting over coffee, going digital with a hangout, or in any spot where ideas are flowing,

5. Genuine passion

remember, mentors are like the behind-the-scenes

Last but not least, why a mentor has chosen to take

wizards of your career. They’re the ones who can give

you under their wing matters. Some people just love

you the power to get to your goals faster. The more

dishing out what they know and helping others shine.

you meet and share, the more you will both gain from

It’s their way of giving back. But just be mindful:

the process.

in some fields you have to keep an eye out for ulterior motives. Make sure their ‘why’ lines up with your goals.

I S S U E 17

www.linkedin.com/in/asmitagovind

WOMEN IN SECURITY MAGAZINE

57


SANDI LARSEN

WHY COMPANIES SHOULD MAKE IT EASIER FOR WOMEN TO RETURN TO THE CYBER WORKFORCE AFTER A CAREER BREAK by Sandi Larsen, Vice President, Global Security Solutions at Dynatrace

The sector badly needs more bodies, and supporting

devoting a larger proportion of their high-tech budgets

women to return after taking time off will help boost

to technologies and services that can strengthen their

numbers and diversity. If there is an industry likely

defences.

to experience stronger sustained demand than cybersecurity over the next few years, I would like to

DESPERATELY SEEKING SECURITY STAFF

know what it is.

Consequently, experienced security resources remain scarce. By 2026 the number of unfilled positions in

58

Since the onset of the COVID crisis there has been a

Australia is expected to reach 30,000, according to

sea change in the way businesses and organisations

research from CyberCX.* Attracting, developing and

think about the practices, processes and programs

retaining more skilled people has become an urgent

that protect their systems, data and intellectual

imperative: for vendors, service providers and end

property from hackers and cyber-criminals.

user organisations alike.

Cybersecurity is now viewed as a critical business

Universities and training colleges are working hard

investment. Organisations are spending accordingly,

to meet demand by funnelling more young people

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

into the sector, but, as demand continues to rise, it’s

system which pairs returning staff with longstanding

a perpetual game of catch-up. And it’s a game that

employees who can help them get up to speed on

businesses and the country cannot afford to lose,

what they have missed.

given the existential threat cyber-crime now poses to operations, productivity and profitability.

Having a ‘go-to person’ to lean on helped alleviate some of my anxiety about how overwhelmed I would

WELCOMING WOMEN BACK IN

be when I started back after taking a year’s personal

One straightforward way we can collectively grow

leave from my previous company. But I believe there

the talent pool, and boost diversity at the middle and

is still much more we can do as an industry to help

upper levels of management in the process, is by

highly skilled cyber women return to the game.

making it easier for women to return to the workforce after a career break.

I would love to see companies invest in formalised, proactive programs that deliver tailored support to

Taking extended time out for family and caring

those returning from an extended break, and for these

responsibilities is part of the work-life journey for

to become the norm across the cyber sector.

tens of thousands of Australian women each year. Getting re-established in the workplace and their

For women working at the pointy end, that support

careers is a challenge for many, and the cybersecurity

could be immersive training to familiarise them with

sector can be more challenging than most. Tools

the latest technological developments. Others may

and technologies continue to evolve ever more

need to be updated on developments within their

rapidly. A year or two away from the office can see an

company, including any restructuring or business

individual’s skills and knowledge become out of date.

expansion initiatives that may impact their role.

NOT WAVING, DROWNING

A SMART SOLUTION

In the past, women were very often left to ‘sink or

I see enormous potential benefits for employers,

swim’ upon their return to work. This was my own

employees and the cyber sector as a whole in

experience when re-entering the ICT workforce in the

adopting such initiatives. Companies would get

early noughties following the birth of my children.

the chance to reconnect with proven contributors:

Back then, companies gave little consideration to

employees who understand their culture and goals

easing the passage for women returning to the

and know how to navigate the system. Women would

workforce. Rather, it was tacitly assumed returning

gain a smoother, better defined pathway back to the

females would have sufficient motivation, hustle and

workforce. And the industry as a whole would benefit

stamina to handle whatever was thrown their way.

from simultaneous reductions in the skills shortage and the gender imbalance.

We certainly did our best. I well remember sitting down at my desk that first day back to start catching

That is my idea of a win-win-win, and something

up on what I had missed, but it was far from easy.

those of us who are serious about creating a stronger,

Little surprise that many women find it too daunting

more diverse cyber sector should continue to

and opt to pursue alternative pathways.

advocate for at every opportunity.

MAKING THINGS BETTER

* Cyber CX - Upskilling and Expanding the Australian

I am gratified to observe that things have improved

Cyber Security Workforce

somewhat since then. At Dynatrace, for example, we ensure women are not penalised financially by their decision to take time out, and we have a buddy

I S S U E 17

www.linkedin.com/in/sandi-larsen-06563b1

WOMEN IN SECURITY MAGAZINE

59


JAY HIRA

BABY NAGAYO

KAVIKA SINGHAL

NEED FOR SIMPLIFICATION OF DATA BREACH REPORTING REQUIREMENTS by Jay Hira, Founder and Executive Director at MakeCyberSimple Baby Nagayo, Assistant Director at EY Kavika Singhal, Cyber Security Consultant at EY

Startling figures from ISACA’s 2023 State of

cybersecurity frontline dealing with retention

Cybersecurity report reveal a concerning trend

challenges and skills gaps.

in Oceania with 78 percent of organisations under-reporting cyberattacks, surpassing the

THE REGULATORY MAZE

global average of 62 percent. Moreover, the latest

Underpinning the under-reporting problem is the

Notifiable Data Breaches report from the Office of

intricate web of data breach reporting requirements.

the Australian Information Commissioner (OAIC)

The primary framework, the Notifiable Data Breaches

indicates a worrisome 16 percent reduction in breach

(NDB) scheme, enforced by the Privacy Act 1988

notifications, with only 409 incidents reported in the

since 22 February 2018, mandates that “all Australian

first half of 2023.

Government agencies and organisations with an annual turnover of more than $3 million” notify

The OAIC found 65 percent of cybersecurity teams

affected victims and the OAIC of potential harm

to be operating with insufficient staff. Meanwhile,

resulting from a data breach.

93 percent of organisations report facing the same

60

or increased number of cyberattacks compared

In addition to the NDB scheme, organisations must

to the previous year. This increase in attacks

navigate other regulatory requirements imposed by

places immense pressure on an already stretched

various industry regulators. Businesses operating

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

within the eleven identified critical infrastructure sectors face additional reporting obligations with varying timelines, deadlines and multiple communication channels.

WHY REPORT? Despite the awareness of reporting obligations, many organisations feel overwhelmed by the intricate process, unsure of whom to inform, when to report and what details to provide. Understanding the ‘why’ behind reporting is crucial for instigating change.

THE PATH FORWARD: SIMPLIFICATION FOSTERING TRUST

Simplicity is paramount to resolving the current

In addition to being mandatory, reporting a data

reporting quagmire. The multitude of data breach

breach in Australia demonstrates an organisation’s

reporting regulations in Australia, while commendable

commitment to transparency and accountability, and

in their commitment to safeguarding personal

fosters trust among customers and stakeholders.

information, unintentionally contribute to under-

Effective management and reporting of incidents can

reporting. Streamlining breach reporting under a

mitigate reputational impacts, maintain customer

unified act that supersedes existing requirements

loyalty and protect the reputation of the business

would promote clarity, reduce duplication and free

long-term.

up understaffed cybersecurity teams to focus on response and recovery.

NATIONAL SECURITY Cyber incident reporting is essential for national

In conclusion, as cybersecurity experts strive to

security and contributes to the development of a

innovate and fortify digital defences, the reporting

comprehensive threat picture for the Australian

mechanisms should facilitate quick and accurate

Government, informing proactive and reactive

notifications while minimising unnecessary

cyber response options. Failure to report cyber

duplication and complexity. Such a streamlined

breaches impacts national learning and ongoing

approach would contribute to a more resilient and

prevention efforts.

secure digital landscape for Australia.

INDUSTRY COLLABORATION

REFERENCES

Breach reporting and threat intelligence sharing

• https://www.isaca.org/resources/reports/state-of-

strengthen industry collaboration. They enhance the capacity of organisations to implement breach protection strategies.

cybersecurity-2023 • https://www.oaic.gov.au/privacy/notifiable-databreaches/notifiable-data-breaches-publications/ notifiable-data-breaches-report-january-to-

MINIMISING IMPACT

june-2023

Efficient and fast reporting also reduces the potential severity of a breach on customers and affected stakeholders. Identify theft, leaking of confidential information, financial impact and emotional stress can result from a breach. If a customer receives timely, up to date reporting, the better they are able to manage the impact.

I S S U E 17

www.linkedin.com/in/jayhira

www.linkedin.com/in/baby-nagayo-09821210b

www.linkedin.com/in/kavika-singhal

WOMEN IN SECURITY MAGAZINE

61


SIMON CARABETTA

THE PEOPLE YOU DESERVE, AND THE PEOPLE YOU NEED by Simon Carabetta, Business Development Manager - Cyber at Digital Resources Australia Pty Ltd

The reactions I get from people when I tell them

NEGATIVE PERCEPTIONS

the career I’ve moved into are as inevitable as the

I knew I was headed in the right direction, despite the

daily rise of the sun. I’m a recruiter, a cybersecurity

fact that every day leading up to our first interview, I

recruiter, and I’m proud of that. You should be, too.

had to hear many former colleagues and people in the

Here’s a short article explaining why.

security industry talking negatively about recruiters and agencies. Even my former boss, who likened

It was just over a year ago when I started entertaining

them to real estate agents and car salespeople, failed

the thought of going into recruitment. I knew if I

to deter me from going ahead.

were going to make the move I would be recruiting specifically for cybersecurity roles. That much was

While I have had negative experiences with recruiters,

for sure. In all honesty, my previous job in project

I have used those experiences to help me be a better

management was simply not for me. As much as I

recruiter and to try and turn around the common

tried, a mix of a toxic work culture and lack of strategy

negative perceptions of recruiters. Thought leaders

from the leadership completely ruined my motivation

and role models need to rewrite the narrative in which

and any inspirations I had.

recruiters are seen as disreputable head hunters so they become heroes holding out their hands to help

When I finally approached a friend of mine who also

people get the best out of their careers and change

happened to be a recruiter, I had no idea she was

their lives for the better.

already thinking about asking me to join her team. I

62

will forever be grateful to her, because the move has

Since joining Digital Resources in September of this

changed my life in many positive ways, and has pulled

year, I’ve reignited my own career and been able to

my career back from the brink.

return to being my best self, thanks to the culture

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

and people of the company and the support I have

had experiences with terrible real estate agents or car

received. I now want to give back and make it my

salespeople which spurred him to cast aspersions on

mission to positively change as many people’s

the profession. However, I can honestly say, I am yet

lives as I can before I retire: the lives of hiring

to meet a terrible colleague or a terrible recruiter from

managers, future colleagues of my candidates, or the

another business in this new phase in my career.

candidates themselves. Built into the core of the best recruiters is the desire

THE EDUCATION PIECE

to change people’s lives. Cybersecurity is an extremely

I’ve been in cybersecurity just over four years. In that

broad industry with diverse roles, requiring various

time I’ve continued to evolve, adapt and keep learning.

types of knowledge and skills. Transferable skills

I’ll continue to learn until I retire. What I love most

from other professions are very much welcomed,

about my new role as a recruiter is the opportunity I

and sought by many hiring managers. We are seeing

get to educate both my clients and my candidates.

a mass migration from areas such as law and law

Clients, for example, may know they need a specific

enforcement, aviation, health and the arts into

role with specific skills in cybersecurity, but are not

cybersecurity roles.

sure what exactly to look for in candidates. And candidates may have just graduated and be unsure

It is also the best time to be a recruiter in

where to go next or how to get their foot in the door,

cybersecurity because never before has there been

how to write a CV or even how to get their name out.

such a need for roles across so many verticals and in so many types of organisations, both in the public and

The education piece for me is the reason why I spend

private sectors.

an average of 30 minutes on each phone call with my candidates, and ask so many questions. Seventy

Cybersecurity is not going away anytime soon and

five percent of a call is listening to them speak, 20

the nature of cybersecurity jobs will continue to

percent is getting to know them, and the remaining

evolve with new ones being created at a rapid rate.

five percent is the trusted advice I provide.

How many organisations in Australia had full time, permanent cybersecurity awareness trainers 10

It’s the same when I speak with clients, whether they

years ago?

be existing or prospective clients. The education piece is the differentiator, and here’s the kick: it’s never

The next time you have a conversation with someone

purely transactional. My view is that we can only build

about recruiters, even if it’s about a bad experience,

business by first building relationships. It’s as simple

just know that there are many of us out here working

as that.

hard to make a difference. We love what we do, and we do it because we love helping people and

THE RECRUITER WITH A THOUSAND FACES

changing lives.

Have you ever read any Joseph Campbell? I’ve been a big fan ever since I read his seminal work The Hero With A Thousand Faces in my first year of university.

www.linkedin.com/in/simoncarabetta

The book analyses humankind and cultures from all over the world from a mythological perspective to support its premise that all humans have similar core concepts written into them. Most recruiters are the same. We all want what’s best for our stakeholders. Yes, there are some who bring ruin to our image, just as my former boss possibly

I S S U E 17

WOMEN IN SECURITY MAGAZINE

63


LAURA EDWARDS-LASSNER

WE’RE ALL IN THIS TOGETHER: HOW FEMALE COLLEAGUES CAN KEEP NEW MOTHERS CONNECTED TO THEIR CYBER CAREERS by Laura Edwards-Lassner, VP of Talent Management at BeyondTrust

It’s up to all of us to support our fellow cyber women

But does it really have to be so difficult? The answer

during and after maternity leave.

to that question is a hard ‘no’. There is a lot we can do to make it easier for our female colleagues to feel

Becoming a mother can be isolating, exhausting and,

connected, included and supported. And if we value

at times, overwhelming. So can the thought of having

the diversity of thought and the skills they bring to the

to return to work a few weeks, months or years hence.

table, there’s never been a better time to start doing it.

If you work in the cybersecurity industry, the anxiety may be particularly acute, given ours is an industry

IT’S GOOD TO TALK

that continues to evolve at warp speed.

At BeyondTrust, I’m beyond proud of the role I’ve played in establishing a semi-official support network

Take an extended period of time out from your job

for the new parents in our ranks. About five years

and there’s a fair chance you’ll find yourself behind

ago one of our employees was preparing to go on

the eight ball when you return, and with less energy

maternity leave and it struck me that we had few

than previously to devote to getting yourself back up

plans in place to support her during her absence. I

to speed.

volunteered to act as a resource: a point of contact with the company, a sounding board and a conduit

64

Throw the complexity of childcare and separation

for any questions or concerns she wanted to raise.

anxiety—mum from baby and vice versa—into the mix

I mustered a small cohort of trusted women across

and it is little wonder many newly minted parents feel

the organisation who were willing to do the same for

tempted to call time on their cyber careers.

other expectant mothers as the need arose.

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


I N D U S T R Y

P E R S P E C T I V E S

Should new mothers wish to remain connected with

I was humbled and moved recently when, shortly

the BeyondTrust workplace whilst on leave—there

before one of our staff members headed off on

is no requirement, or pressure, for them to do so—

maternity leave for the second time, she made

we keep them updated on things happening in the

a point of telling me how much she was looking

company via email, phone call and in-person chat.

forward to chatting to me while she was gone, and what a comfort it would be to remain connected with

We make plans together for their return to the office.

someone who she worked for and with.

We let them know about the support they can access, both internally and externally, and we invite them

Our retention rates for female employees attest to the

to come in and visit us with their babies prior to

benefits the company has enjoyed as a result of our

their return.

collective efforts. We currently have 18 ‘boomerangs’ on the BeyondTrust payroll: women who have left and

MAKING THE JOURNEY TOGETHER

returned, some several times.

This support does not cease once our new mothers return to their desks. We are committed to helping

As an organisation we’re the better and stronger

them reintegrate into the office environment and

for having them, and having them back. They bring

master the work/family juggling act.

diversity and fresh perspectives to our workplace, along with a sense of positivity because they feel

We provide them with a buddy: someone who has

recognised, supported and included as human beings

been through the experience and can offer valuable

with personal as well as professional responsibilities

perspectives on how to handle everything from

to fulfil.

expressing in the office to the inevitable anxiety the ‘first business trip after baby’ brings.

STRONGER TOGETHER “Be the change you wish to see” is an oft quoted

We help them organise any training they may need

mantra for a reason. As women working in the

to get themselves back up to speed. And, most

male dominated cybersecurity industry we share a

importantly, we let them know how much we value

collective responsibility to do what we can to even up

the contribution they’ve made, and will make, to the

the scales by making it easier for women to get in and

company’s success and growth.

stay in. Supporting our colleagues on the parenthood path is a practical and rewarding place to start.

THE BOOMERANG EFFECT And our grassroots support program has made a difference to the wellbeing, workplace performance

www.linkedin.com/in/lauredw

and return rates of our female employees.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

65


NICOLLE EMBRA Cyber Safety Expert, The Cyber Safety Tech Mum

C O L U M N

Planning for healthy screen time limits

Screen time has become a part of our lives, including

ASSESS CURRENT DAILY ROUTINES

our children’s. While it can be a fun and educational

The first step to limiting screen time is to assess your

way to learn and play, too much screen time can have

child’s current daily routines. How much time do they

negative consequences such as sleep problems,

spend on screens each day? What types of activities

emotional issues, obesity and attention difficulties.

do they engage in while on screens? Once you have a good understanding of their current screen time

Planning can be used as a tool to help keep our

usage, you can start to think about how you would

children’s screen time within acceptable limits. By

like it to look.

taking the time to assess their current screen time

66

usage, create activity lists, loosely plan your days,

CREATE ACTIVITY LISTS

consider the type of content they consume, set screen

Work with your child to create a list of alternative

time limits and lead by example, you can help them

activities they enjoy. These can include playing

develop healthy screen habits that will benefit them

outdoors, reading books, doing arts and crafts,

throughout their daily lives today and into the future.

playing board games or engaging in sports. Mix up

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


the list with other activities: those that can involve a

LEAD BY EXAMPLE

sibling, need an adult or are for the whole family.

As parents we play an important role in modelling healthy screen habits for our children. Be mindful

LOOSELY PLAN YOUR DAYS

of your own usage, especially when you are around

Once you have a list of alternative activities you can

them. Try to avoid using screens at mealtimes or in

start to loosely plan your days. This does not mean

bed. Instead, focus on spending time together and

you have to schedule every minute of the day, but

engaging in other activities.

having an approximate idea of what you want to do can make it easier to transition between different

Achieving acceptable screen time limits is a journey,

activities and reduce screen time.

and it is okay to have some days which go better than others. The key is to be consistent in your efforts

For example, you might start the day with breakfast

and keep the lines of communication open with

and some screen-free time such as reading or playing

your children. By planning and creating a supportive

together. Then, your child might go outside to play

environment we can help our children develop healthy

or do some homework. After lunch they might have

screen habits that will benefit them throughout

some more screen time, followed by another round

their lives.

of outdoor play or indoor activities. In the evening movie night or some screen-free time. Having a

SOME OTHER TIPS TO HELP REDUCE SCREEN TIME:

loose structure for the day can assist in decreasing

• Establish screen-free zones in your home, such as

you might have dinner together followed by a family

the number of times your child asks for screen time, because they know what other activities they will be undertaking.

the bedroom, the dining room and bathroom. • Encourage your child to take breaks from screens at least every 20-30 minutes. • Use screen time as a reward for good behaviour

CONSIDER THE TYPE OF CONTENT THEY ARE CONSUMING It is also important to consider the type of content your child is consuming when they are on screens. Make sure there is a balance between educational and entertaining content. There is a big difference

or completing chores (consider your child’s personality first before using this method). • Talk to your child about what they are watching or playing on screens. • Make screen time a family activity. Watch movies or play video games together.

between an hour spent mindlessly watching YouTube videos compared to an hour using a school approved maths educational app. You may also want to limit their exposure to certain types of content such as

www.linkedin.com/in/nicolle-embra-804259122

violent video games or inappropriate websites.

www.linkedin.com/company/the-cyber-safety-tech-mum

SET SCREEN TIME LIMITS

www.thetechmum.com

Discuss and set reasonable screen time limits together with your child. Having their input can make them feel more involved and responsible for their screen time choices. Consider using parental control

www.facebook.com/TheTechMum

www.pinterest.com.au/thetechmum

apps or features to enforce your agreed screen time limits.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

67


Need Event Speaker Services

Tell us more about what YOU need.... Need an MC or host? Looking for a keynote speaker? Want to get matched with industry expert speakers? Need speaker inspiration/ideas? Looking for presenters or analysts? Need your events speaker lineup managed end-to-end?

REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.

With:

aby@source2create.com.au charlie@source2create.com.au source2create.com.au


STUDENT IN SECURITY SPOTLIGHT


Katie Perry was born in Australia and worked as at an internet service provider in Adelaide for several years before moving into cybersecurity. KATIE PERRY Purple Team Australia Student

Tell us what you are doing today.

fosters collaboration between blue and red teams to

Today, I am enrolled in the Purple Team Australia

safeguard all aspects of cybersecurity. The inclusion

initiative, the first national program to address

of both blue and red team modules is particularly

the widespread shortage of cyber skills and

advantageous because it allows for exposure to and

simultaneously promote gender diversity in the

experience with both teams, which sets it apart from

workplace. The aim of this program is to prepare us

other platforms.

for entry-level positions in cybersecurity and ensure a seamless transition into our new careers.

The Purple Team Australia program provides a dynamic learning experience that incorporates

This program is carefully designed with the goal

theoretical knowledge and practical exercises. With

of empowering and improving the skill set of 320

online instructor-led sessions, monthly industry

women from diverse backgrounds across Australia,

experts as guest speakers, and fortnightly mentoring,

including First Nation Australians. It equips them

I am being prepared to enter the workforce as a

with the necessary skills to begin a fulfilling career

skilled cybersecurity professional.

in cybersecurity. This program is structured into five units, with one Purple Team Australia has two intakes (June 2023)

unit covered per month. Most of the program is

and (June 2024) with 160 students participating in

delivered online through a user-friendly learning

each intake, across all eight states with 40 mentors.

management system, but we also have engaging

The program is sponsored by Cybermerc Pty Ltd,

in-person sessions conducted by instructors in

AustCyber, Baidam Solutions Pty Ltd, Anomali,

each state.

Australia Women in Security Network (AWSN), Uplifting People and The University of Tasmania.

What distinguishes the Purple Team Australia

Without their support The program would not exist.

Program from other learning platforms is its handson approach. Rather than focusing on theoretical

Are you in full or part-time study? Where? What exactly is the course you are undertaking? How long have you been doing it? When do you expect to complete it? And how did you get there?

knowledge it focuses on practical experience. This

I completed my studies at With You With Me on 31

critical thinking, providing us with valuable first-

March 2023, and promptly applied for the Purple

hand experience.

means students can put what they learn into action in real-world scenarios faced in today’s climate. The program guides us through a series of step-bystep practical activities and challenges that require

Team Australia program. My ambition was to go from being a business owner and financial controller

We use Slack as our communication centre to

into cybersecurity by using my experience of financial

facilitate contact between staff, mentors and

audits and analysing transactions for abnormalities.

students, boost cooperation, enable support, and facilitate assistance. It has a diverse set of channels

70

In the past, cybersecurity professionals were typically

in which students may actively participate and is

divided into blue team roles for defence and red team

an excellent platform for sharing program-related

roles for offence. However, Purple Team Australia

thoughts and experiences. Furthermore, Slack’s

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


S T U D E N T

I N

S E C U R I T Y

S P O T L I G H T

tablets, desktops and mobile phones—ensures

reaction did you get from family and friends when you decided to pursue cybersecurity?

ongoing accessibility, making it easy for members

I am naturally curious, particularly when it comes to

to participate in the program while juggling work and

examining the broader aspects of human behaviour. I

family duties.

frequently delve into inquiries involving the how, why,

integration across several platforms—laptops,

what, who and when aspects. The standout feature of the program is its unwavering focus on hands-on experience. At each

My career journey began as a personal assistant

juncture we are presented with chances to put our

at an internet service provider. I was interested

knowledge into action in real-world scenarios.

how all areas of the business —sales, finance and cybersecurity—came together and my interest led me

The program is organised into three units: IT

to gradually transition into finance.

Essentials, Blue Team and Red Team. Additionally, an exciting in-person Purple Team graduation event is

In late 2022 I observed that several Australian

scheduled for November 2023 in Canberra at which

businesses had encountered data breaches and,

sponsors, program partners, staff, mentors and

like many Australians, I had my own personal data

students come together and demonstrate the skills

breached and exploited. I felt uneasy about my

we have practiced throughout the program.

information being exposed. I was curious and wanted to know how and why this was happening.

Since starting the program on 26 June 2023, I have been fully engaged in its content. With a commitment

My mind went into overdrive. I wanted to learn about

of a minimum 10 hours per week I have delved

cybersecurity. I was naturally curious to find out how

into fascinating topics and acquired practical skills

these types of incidents occurred and how we could

that are in high demand. I have found areas of the

prevent them. I researched cybersecurity courses

program that excite me, and curiosity led me to

and read through the requirements of the industry. I

learn further about specific subcategories within

am not a technical person, but I noticed that finance

cybersecurity. Securing a place in this program was a

and cybersecurity encompass similar qualities.

notable milestone for me. Towards the end of December 2022 I began my Following my application earlier this year I went

first cybersecurity course. My family and friends

through a series of assessments and interviews.

expressed their enthusiasm upon hearing this,

Being chosen from a pool of highly skilled candidates

and collectively acknowledged that we inhabit a

was a superb privilege, and I attribute my dedication,

technology-driven society. We rely on technology

passion, determination, inquisitiveness, eagerness

for everyday activities such as using the internet,

to learn and career transition as pivotal factors in

streaming services, email, online banking and more.

helping me secure my spot.

Given the pervasive role of cybersecurity in all these activities, there is a pressing need for education,

Were you inspired by cybersecurity in high school, if so, how? Or was it a later employment role that led you there? What

I S S U E 17

not only for ourselves but also for the broader community: families, businesses and the elderly.

WOMEN IN SECURITY MAGAZINE

71


KATIE PERRY

It was my experience of having my information

Upon concluding the audit, I participated in a

exploited that set me on my cyber journey, and I am

meeting with management where I recommended

grateful to have been chosen to participate in the

enhancements to the accounts payable process to

Purple Team program as our values were in sync. My

mitigate the risk of unauthorised transactions.

goal is to contribute to making the online community a safer place and bring about a positive impact.

Following this internal audit, I was engaged by a nationwide credit management company to

Please give us a brief rundown of your career to date. The jobs you have had, where and when, in cybersecurity and other fields. And please, mention anyone who has been particularly influential in your journey.

specialise in skip tracing for their client base. Skip tracing entails using publicly available information to conduct searches on individuals who have either failed to settle their debts or have relocated without notifying the debt agency.

My first role was a personal assistant for an Internet Service provider in Adelaide. After several years I

My responsibilities included analysing financial

moved to finance. I served as a credit controller at

records, conducting credit checks to obtain location

one of Australia’s largest pharmaceutical wholesalers

information, delving deeper into fine locations

where I had the privilege of managing a weekly

and employing techniques such as reverse image

seven-figure ledger.

searches and social media investigations. After verifying the authenticity of the data, I would proceed

During my first year I was entrusted with the

to carry out the debt collection process using my

primary responsibility for a significant portion of the

negotiation skills.

financial ledger within the department, which carried substantial accountability. This role allowed me to

In 2014 I was given the opportunity to run and

cultivate strong internal and external relationships

operate a struggling business. I led a team of 17

founded on mutual respect and effective

staff, processed weekly payroll submissions, ran

communication. My duties included locating debt,

weekly supplier payments, prepared the weekly

meticulous account reconciliations and performing

rostering schedule, provided daily business

thorough financial risk assessments. Unfortunately,

operations, reduced business operation costs, set

due to change of business ownership, my position

accurate and strategic pricing structures, marketed

was made redundant.

the business on social media platforms and analysed the market for social trends. I was responsible for

Following my redundancy, a recruiter reached out

training 17 staff and delivering a positive customer

to me regarding a contract role assisting with an

service experience. I managed to retain a 4.8 star

internal audit. I collaborated with external auditors

customer satisfaction rating until November 2020

from a law firm, analysing two years’ worth of

when the business changed hands.

transactions across all bank accounts accessible by a particular individual. I generated multiple reports to identify abnormalities in the general ledger and cost centres, initiating additional inquiries and findings.

72

W O M E N I N S E C U R I T Y M A G A Z I N E

When you complete your course and gain your qualification, what next? Do you have a clear vision of a role it will help you attain, or, if you

N O V E M B E R • D E C E M B E R 2023


S T U D E N T

I N

S E C U R I T Y

S P O T L I G H T

are already in work, is it something you feel will help you do your job better and, hopefully, gain a promotion?

I adapted by reducing our large menu to a

A great feature of Purple Team Australia is its

outbreak. I limited the amount of stock on hand

employer matching process. At the end of the course

to minimise the risk of food wastage and the

in November 2023, our talent manager will contact us

associated financial risk.

manageable size that I could handle if staff became sick or if we had to shut down as the result of an

individually to discuss our ambitions for employment and endeavour to match us with a suitable employer.

I managed to use food delivery platforms to provide our products to families in our community. I

It takes much more than cybersecurity expertise to be a good cybersecurity professional. In most roles people skills are essential. There is also the ability to be creative, to ‘think outside the box’. Do you plan to undertake, or are you already undertaking, training in disciplines other than cybersecurity to support your career plans?

introduced ‘go to family meals’ for families who could

Definitely. Cybersecurity requires more than technical

the opportunity.

not leave their homes. I am aware of the importance of staying up to date with cybersecurity practices and learnings and I am constantly pursuing learnings to expand my knowledge in the sub-fields of cybersecurity. I am willing to undertake additional training given

skills. It requires clear communication skills and people skills to provide information to a client in a way that makes it understood. I believe I possess people skills and the ability to adapt and think on my feet. I have been in situations where I had to think of an outcome or a strategy with little notice.

What about specific cybersecurity qualifications such as those offered by (ISC)², CompTIA and ISACA, Have you gained, or do you plan to gain any of these, if so which ones and why? My goal is to gain employment in cybersecurity

I believe my ability to solve problems and adapt

and then pursue these certifications to open more

swiftly will help my chances for future employment.

employment opportunities in the future. Once I am

I also have the desire to learn and undertake any

employed I will have the necessary experience to

additional training necessary to perform my job

gain some of these certifications.

with precision and accuracy. I have developed the

outside of the box. I was in the hospitality industry

And of course we’d like to hear about the specifics of your current course. Please give us a few details of what you are studying. What do you enjoy? What do you find challenging? What would you like to see done differently?

where ever-changing rules were in place that

The Purple Team program covers five core areas

limited our occupancy numbers without providing

of cybersecurity: cyber awareness, IT essentials

sufficient notice.

(Linux), blue team (defence), red team (offence) and

skill to communicate effectively, professionally and courteously while also maintaining a harmonious and cooperative working atmosphere. During the COVID 19 pandemic I had to think

I S S U E 17

WOMEN IN SECURITY MAGAZINE

73


KATIE PERRY

purple team (a combination of blue and red team).

incidents, techniques and alerts by following blogs,

Subcategories include: Linux, networking, protocols,

tuning into cybersecurity podcasts, subscribing to

malware analysis, SIEM operations, governance and

forums, and subscribing to email alerts.

compliance, vulnerability management, exfiltration and CTF (capture the flag events) to name a few.

In 2023, a cybersecurity topic taking the spotlight is the use of artificial intelligence. It would be highly

Because I do not possess a technical background

beneficial to consider incorporating a subsection

I found learning Linux a little challenging. However,

related to this in the course in the near future.

this did not deter me from completing the module as

labs and training sessions. I especially enjoyed the

Please tell us about your experience of being a woman studying cybersecurity. Chances are you are in a minority. Do you feel disadvantaged? Have you encountered sexism or misogyny? Do you feel your institution does sufficient to address such issues?

blue team module of the course because it is an

In my time of attending cyber events I have observed

area I am interested in and could relate to: protecting

the gender gap in the cyber community. However,

systems, data and information. This module covered

I am not discouraged from pursuing employment

vulnerability assessments, the MITRE ATT&CK

opportunities. I have never felt disadvantaged or

framework, malware analysis, SIEM operations,

encountered sexism in the cybersecurity industry.

threat hunting, incident response, governance risk

Everyone I have met, in person or online, has

and compliance and disaster recovery.

welcomed me and treated me equally and with

it was still a good learning experience to understand how command lines work and the actions they perform. I particularly enjoyed the practical aspects of the

respect. I have felt respected because we share the I find the content provided by Purple Team Australia

same work ethics, beliefs and values.

to be highly engaging, detailed, comprehensive and informative. The course is designed in a way that is

I am grateful for my acceptance by Purple Team

easy to follow and it incorporates a blend of theory

Australia, where the primary objective is to change

and practical testing across its five modules, making

the landscape of cybersecurity and create a gender

it an interactive learning experience.

diverse industry. I was fortunate to be matched to a female mentor (Sandy Assaf) who has guided and

74

Almost every aspect of cybersecurity is evolving rapidly. Do you feel your course is doing enough to keep up? Are there topics you would like to see covered, or topics you think should be omitted?

supported me through my cybersecurity journey.

I believe this course comprehensively addresses a

Having a female mentor like Sandy signifies the

broad spectrum of topics and provides insights into

importance of representation. It is a testament to the

the latest techniques employed in the ever-evolving

fact that women can thrive and lead in traditionally

field of cybersecurity. Additionally, it emphasises

male-dominated fields. Sandy’s journey saw her

the importance of staying up to date with current

overcome obstacles and break barriers, which can

W O M E N I N S E C U R I T Y M A G A Z I N E

Sandy’s support has helped me to recognise my unique skills and how I can contribute to the industry in my own way.

N O V E M B E R • D E C E M B E R 2023


S T U D E N T

I N

S E C U R I T Y

S P O T L I G H T

be incredibly inspiring for someone starting in the

glimpse into the industry and the opportunity to

field. Sandy serves as a role model, showing that

interact with like-minded individuals was invaluable.

women can excel and inspire others in this industry. This support is crucial for fostering confidence and

I have gained a deeper understanding of the industry,

resilience, particularly for women in a field where

expanded my network and forged meaningful

they might be in a minority.

connections. Meeting these connections face-to-face has proven to be valuable. Networking plays a pivotal

Educational institutions, especially universities—the ‘ivory towers’—are often seen as being out of touch with the real world. If you are not already immersed in the broader world of cybersecurity what will you be doing to prepare yourself for that transition, for example by joining industry bodies like the Australian Women in Security Network (AWSN)?

role in cybersecurity.

And finally, having come this far, do you have any regrets. If you had your time again, would you take a different path? I can affirm that switching to cybersecurity has been the most rewarding choice I have made. I have no doubts or regrets, and the opportunity I have been granted with Purple Team Australia has

Before enrolling in the Purple Team Australia

been exceptional. This opportunity has laid the

program I took the initiative to become a member of

groundwork for me to commence a new chapter in

AWSN. This organisation is dedicated to empowering

my professional journey. Thank you.

women in cybersecurity providing not only valuable support but also hosting events, offering training and facilitating mentorship opportunities.

www.linkedin.com/in/katie-perry-259047260

Being an AWSN member has allowed me to partake in networking events and access additional programs that would otherwise be unavailable to me. Furthermore, I have actively participated in AWSN’s in-person events, enabling me to forge new connections in my local community. I am also a member of the Australian Information Security Association (AISA), which offers networking events, education and training, newsletters, member and industry events. I had the opportunity to attend AdelaideSEC in August 2023 and I have also participated in several online webinars facilitated by AISA. Through the AISA network I have established valuable connections. AdelaideSEC offered a valuable

I S S U E 17

WOMEN IN SECURITY MAGAZINE

75


Mance Hung was born and grew up in Taiwan. She recently completed full‑time studies at the University of South Australia for a bachelor’s degree in networking and cybersecurity. Bachelor of Networking and Cybersecurity Graduate at University of South Australia MANCE HUNG my technical know-how, my background in sales

What exactly is the course you are undertaking? How long have you been doing it? When do you expect to complete it? And how did you get there?

and banking has honed my people skills. I believe in

I undertook a Bachelor of Networking and completed in July 2023. My journey began with an

What about specific cybersecurity qualifications such as those offered by (ISC)², CompTIA and ISACA?

interest in technology and how it influences modern

I have pursued Cisco CCNP ENCOR through LinkedIn

businesses, leading me to delve deeper into the realm

Learning and plan to explore certifications from

of cybersecurity.

(ISC)² and CompTIA to further solidify my skills and

Cybersecurity, which I started in February 2020 and

continuous learning and am open to pursuing courses that enhance soft skills and creativity.

industry recognition.

Were you inspired by cybersecurity in high school, if so, how? Or was it a later employment role that led you there? What reaction did you get from family and friends when you decided to pursue cybersecurity?

Please tell us about the specifics of your current course. My course covered a range of topics including network troubleshooting, security analysis and user

Cybersecurity caught my attention during my time

support. I particularly enjoyed the hands-on approach

working in international sales. I was intrigued by

in the security management project. Some aspects

the challenges businesses faced in safeguarding

were challenging, especially keeping pace with rapidly

their digital assets. My family and friends were

changing threat landscapes.

supportive. They recognised the growing importance of cybersecurity in today’s digital age.

Please give us a brief rundown of your career to date.

Almost every aspect of cybersecurity is evolving rapidly. Do you feel your course did enough to keep up? While my course was comprehensive, the dynamic

I initially pursued a career in business administration

nature of cybersecurity means continuous learning is

and worked as a bank teller at E.SUN Commercial

essential. There were areas I wish had been explored

Bank in Taiwan. Later, I transitioned to a role as

more deeply, particularly emerging threats.

an international sales representative at Everlight where I live today and where I made the decision

Please tell us about your experience of being a woman studying cybersecurity.

to transition into cybersecurity. Since I made that

While there were times I was in the minority, I never

decision, my mentors at the University of South

felt disadvantaged. My institution was proactive

Australia have been particularly influential.

in ensuring an inclusive environment and I was

Electronics. My journey brought me to Adelaide

always treated with respect. Educational institutions,

When you complete your course and gain your qualification, what next?

especially universities, are often seen as being out

Having recently completed my degree, I’m now eager

in bridging this gap by undertaking internships,

to apply my knowledge and skills in a practical setting,

volunteering, and joining industry bodies like the

ideally in IT support roles where I can bring value with

Australian Women in Security Network (AWSN) to stay

my customer service and technical skills.

connected with professionals and industry trends.

of touch with the real world. I’ve been proactive

It takes much more than cybersecurity expertise to be a good cybersecurity professional. Apart from

76

W O M E N I N S E C U R I T Y M A G A Z I N E

www.linkedin.com/in/mance-hung-bbbb341a9

N O V E M B E R • D E C E M B E R 2023


Egbuliese Jennifer Osato is a sophomore law student in the Faculty of Law at the University of Benin. JENNIFER (OSATO) EGBULIESE Bachelor of Laws Student at University of Benin

I am a young undergraduate law student who has an interest in cybersecurity. In addition, I aspire to one day become a penetration tester. In a bid to expand my horizons in cybersecurity I am undertaking programs from Cisco and Coursera, among others. I got to know about some of the programs by searching for them online. While some are paid and some are free, I do take advantage of the free programs, because they too are educative. I wasn't inspired about cybersecurity. If you had asked me a year ago what cybersecurity was, I would have replied that I did not know such a thing existed. I was introduced to cybersecurity by a friend of mine, and that sparked my interest. I have taken it upon myself to build a career and one day get a job in cybersecurity. The courses I am following from Cisco, Coursera and others are introductory. However, I am planning on becoming a junior cybersecurity analyst and to study for CompTIA certifications and others. I find it quite challenging to make time to learn cybersecurity while studying law. But what keeps me going is my dream of building a career in cybersecurity. It is an emerging and rapidly growing profession. Acquiring and building a skill in cybersecurity is something that anyone in the world should thrive for. Although I have not progressed far in cybersecurity, I have no regrets. Studying cybersecurity teaches you to be more secure as well as giving you skills that can earn you money. Cybersecurity teaches you how to protect yourself from threats. Because I am learning how to make myself more secure, I have no regrets about devoting time to learning about cybersecurity.

www.linkedin.com/in/jennifer-egbuliese-0bb263274

I S S U E 17

WOMEN IN SECURITY MAGAZINE

77


Master of Science in Computer Science and Cybersecurity Student at University of Sunderland NASHRA FAYYAZ

Greetings to all readers! I’m thrilled to introduce myself as Nashra

Enrolling in a cybersecurity

Fayyaz, a 23-year-old born in

program resonated with

Oman, brimming with excitement

me deeply. It was as if the

and ready to take on new

universe had been preparing

challenges. Currently, I’m pursuing

me for this career all along.

a MSc in computer science and

As I progressed through my master’s program I found

cybersecurity. I’m a dedicated full-time student embarking on a year-long journey

myself growing more mature and proficient in

through this program, all while participating remotely.

cybersecurity. I possess a deeper understanding of cyber threats and the ability to address them swiftly

It’s a remarkable story: how I stumbled upon my

and effectively thanks to the knowledge I’ve gained

innate cybersecurity talents. The realisation came to

from my course.

me during my high school year when my friends and I would assist our teachers in creating student grade

SOC analyst goal

reports. I was the go-to person for troubleshooting

My heart is set on becoming a security operations

technical issues such as fixing a malfunctioning

centre (SOC) analyst and I’m diligently working to

printer, refining report designs and content, or

gain hands-on experience through various platforms

eliminating pesky computer viruses. My friends

and home labs. I’ve already completed an internship.

affectionately dubbed me the ‘Computer Guru’ for my

My next goal is to obtain the CompTIA Security+

proficiency in all things tech.

certification to solidify my entry into the world of SOC analysis.

Unfulfilled aspirations My path to cybersecurity was not a premeditated one.

As a woman in cybersecurity I’ve been fortunate

My parents had envisioned a career in medicine for

to experience overwhelming encouragement and

me, but due to financial constraints, I could not pursue

support, both from my friends, family and the LinkedIn

that dream after high school. It was a challenging and

community. I can confidently say I have absolutely

depressing time for me, watching my friends enter

no regrets about choosing this path. I am genuinely

their dream colleges while I remained idle. My nights

happy to be here, and I’m bursting with excitement

were filled with tears and my days consumed by the

about the endless possibilities and challenges that lie

search for an affordable medical college. During this

ahead in the dynamic world of cybersecurity.

tumultuous period, a friend of mine visited me and sensed the emotional turmoil I was enduring.

To all young ladies out there, I wholeheartedly encourage you to explore the field of cybersecurity

She spoke with my parents, advocating for my talents

and join us in showcasing the power of women in

and potential. She highlighted my natural aptitude

this domain!

for computers and introduced them to the world of cybersecurity, emphasising its growing importance in

“There is no limit to what we, as women, can

today’s tech-driven world. She even shared stories of

accomplish.” —Michelle Obama.

my computer guru days. Suddenly, it all made sense to me. This was my calling. www.linkedin.com/in/nashraiscrazyaboutcybersecurity

78

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


HAVE YOU EVER DREAMED OF BEING A

"This technological thriller is the hacker world having such global impact to the unsuspecting world that it makes you very aware the power within the web…” - Trevor, indiebook reviewer

ORDER NOW


AUSTRALIA’S

BEST SELLING S AN AUD I

OK BO

SO AL

A LE

O

AVAIL AB

CYBER SECURITY BOOK

Bought it for my daughter and we are both very impressed! Great artwork as well as the book itself. She is a 9 year old avid internet user, and I do worry about what she gets up to and the choices she makes. We limit her access and have cyber security overlays on her devices - but we are not too clued up on cyber security so it was always a worry. This book has been great to get conversation flowing that I didnt really know how to start up, and it has definitely taught her some worthwhile lessons on things to look out for and "shadowy corners" of the internet to be cautious of! I recommend this book.

BUY THE EBOOK

BUY THE AUDIOBOOK

BUY THE PAPERBACK


LISA ROTHFIELD-KIRSCHNER Author of How We Got Cyber Smart | Amazon Bestseller

Your digital footprint and how it can impact your life Twins Olivia and Jack had been taking turns playing chess online against their cousin Charlie. Charlie loved gaming and had many more accounts than Olivia and Jack, on different websites and apps where they posted pictures, videos, comments and messages. Charlie thought sharing opinions and activities with friends and strangers was fun and harmless. But Charlie did not know everything done online left a trace behind. This trace is called a digital footprint, and it can be seen by anyone who has access to the internet. A digital footprint can reveal a lot of information about a person, such as their name, age, location, interests, hobbies, preferences, beliefs and behaviours. One day, Olivia, Jack and Charlie asked their respective parents if they could all go

I S S U E 17

to a chess camp for the upcoming school holidays, play against other kids in person and compete for the trophy awarded on the last day. Each of them filled out the application form online and awaited the reply. A few days later they received an email from Felix the chess camp director. It said: “Dear Olivia and Jack, we look forward to welcoming you to chess camp this school holidays, please look out for details about what to bring and where the camp will be held.” Their cousin Charlie received this letter, “Dear Charlie, We’re sorry to inform you that your application for the chess camp has been rejected. We have reviewed your digital footprint and found it does not match the values we expect of our campers. We are looking for chess campers who are respectful, responsible and positive.

WOMEN IN SECURITY MAGAZINE

81


Unfortunately, your online activities do not meet our values. We hope you will learn from this experience and be more careful about your online behaviour. Remember that your digital footprint is permanent and public. Sincerely, Felix, Chess Camp Director.” Charlie’s Dad was surprised to receive this email and called Felix to discuss what Felix had seen online that breached the chess camp’s values. Felix said: “We have seen that Charlie has posted rude and offensive comments on other people’s posts, such as calling them names, making fun of their appearance, or mocking their opinions. We have also seen that Charlie has shared inappropriate pictures and videos of themselves and others without their consent. “We have also seen Charlie has lied about their age and identity on some websites and apps, which are for those over 14. We, the chess camp leaders, encourage you to chat to Charlie about how they engage in the online world as their conduct can either help them or hurt them and they need to have a good think before they click.” Felix then said, “These actions are not only disrespectful to Charlie and others, but also dangerous. I’m very sorry but Charlie cannot attend our chess camp.” Charlie’s parents spoke to Charlie about this, they felt guilty they had not spent enough time having conversations about how to behave online. They had been complacent and thought they could leave such conversations to the school, but this was not the case: the teachers had only limited time in the classroom to spend on online safety and behaviour. Charlie’s mother then asked Olivia and Jack’s mother to come over and help her

82

W O M E N I N S E C U R I T Y M A G A Z I N E

speak to Charlie. Olivia and Jack’s mother told Charlie: “You never know who might see your digital footprint and use it against you. For instance, someone might bully you, harass you, hack your accounts, steal your identity, or harm you in real life. Your digital footprint can also affect your future opportunities, such as getting into your preferred school, finding a job or making friends.” Olivia and Jack were sad that Charlie would be unable to come to chess camp with them, but they understood Charlie had made a big mistake by being careless online. Charlie told Olivia and Jack they had decided to change their online habits and had put together a list of what they would do: be more respectful, responsible and positive. Charlie would delete accounts on the websites and apps they did not need or trust, and would apologise to the people who had been hurt or offended online. They would ask friends and family to remove any pictures or videos of them that they did not want to share. They would learn how to protect privacy and security online by using strong passwords, updating settings and avoiding suspicious links or messages. Charlie hoped that by doing these things they could improve their digital footprints and create a better impression of themselves online. Olivia, Jack and Charlie all hoped Charlie could get another chance to apply for the summer camp next year. Everyone had learnt a valuable lesson: Your digital footprint matters. www.linkedin.com/company/how-we-got-cyber-smart

facebook.com/howwegotcybersmart

twitter.com/howwegotcybers1

N O V E M B E R • D E C E M B E R 2023


Recom mend ed by F amily zone

How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary school-aged children.

READ NOW


WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 01

02

1. LISA VENTURA

Founder, Cyber Security Unity

2. AMANDA-JANE TURNER

Author of the Demystifying Cybercrime series and Women in Tech books. Conference Speaker and Cybercrime specialist

03

04

3. MARISKA SCRIBA

Head of Enterprise Security Services at MTN Business

4. SUSAN AJAY

Cybersecurity Analyst at Datacom

05

06

5. CHRISTINA DELL

Director - Governance, Risk & Compliance

6. ALEX PENNA

Software Developer at Atlassian

7. HANNAH RAPETTI

07

08

Cyber Security Analyst – Takedown Team at Proofpoint

8. FLORENCE ARANIEGO

Associate Consultant | Phriendly Phishing - Transformation and Growth at CyberCX

9. AILIE HOULIHAN

09

10

Consultant with the Strategy and Consulting Practice at CyberCX

10. CRAIG FORD

Cyber Enthusiast, Ethical Hacker, Author of A Hacker I Am vol1 & vol2, Male Champion of Change Special Recognition award winner at 2021 Australian Women in Security Awards

11

12

11. KAREN STEPHENS

CEO and co-founder of BCyber

12. JALPA B

Cybersecurity Professional

13. JO STEWART-RATTRAY

13

14

Oceania Ambassador, ISACA

14. FATEMAH BEYDOUN

CCO and Cofounder, Secure Code Warrior

84

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


15

16

15. ASMITA GOVIND

Consultant at Will You Hack IT

16. SANDI LARSEN

Vice President, Global Security Solutions at Dynatrace

17

18

17. JAY HIRA

Founder and Executive Director at MakeCyberSimple

18. BABY NAGAYO

Assistant Director at EY

19. KAVIKA SINGHAL

19

20

Cyber Security Consultant at EY

20. SIMON CARABETTA

Business Development Manager - Cyber at Digital Resources Australia Pty Ltd

21. LAURA EDWARDS-LASSNER

21

22

VP of Talent Management at BeyondTrust

22. NICOLLE EMBRA

Cyber Safety Expert, The Cyber Safety Tech Mum

23. KATIE PERRY

Purple Team Australia Student

23

24

24. MANCE HUNG

Bachelor of Networking and Cybersecurity Graduate at University of South Australia

25. JENNIFER (OSATO) EGBULIESE

Bachelor of Laws Student at University of Benin

25

26

26. NASHRA FAYYAZ

Master of Science in Computer Science and Cybersecurity Student at University of Sunderland

27. LISA ROTHFIELD-KIRSCHNER

Author of How We Got Cyber Smart | Amazon Bestseller

27

I S S U E 17

WOMEN IN SECURITY MAGAZINE

85


THE LEARNING HUB

GRADUATE CERTIFICATE IN CYBER SECURITY

GRADUATE CERTIFICATE IN CYBER SECURITY

This course will allow you to develop cyber tradecraft skills and competencies, including an introduction to cryptocurrencies, encryption, device and network security, vulnerability testing, and strategies to locate offenders. You will learn to apply and use a range of basic software and hardware in cyber investigations, identify points of attack on devices and networks and how to secure them and you will sharpen your critical thinking, investigative and ethical skills.

Designed for students with an academic or professional background in computer sciences and programming, this course offers the expert guidance, realworld experience and practical skills required for a new career meeting Australia’s growing demand for cyber security professionals. In this course, you’ll study core concepts of cyber security, including information risk management, business data management, and political policy-making. You’ll learn using industry tools, including Kali Linux, and have the opportunity to solve real problems using online hacking challenges and real-world case studies.

VISIT HERE

VISIT HERE

MASTER OF CYBER SECURITY Did you know that Australians report a cyber security incident every 10 minutes? This has led to a rise in demand for professionals to develop systems that offer safety and security for businesses and everyday Australians who are reliant on digital platforms. This course will offer you the know-how to create programs that will help you provide safe and secure online experiences. You’ll have the option to select from either the Management and Leadership specialisation or Security Engineering specialisation within this program to further develop your expertise and diversify your career options.

VISIT HERE

GRADUATE CERTIFICATE OF CYBER SECURITY GOVERNANCE AND RISK MANAGEMENT This graduate certificate is comprised of four courses – 3 core and 1 elective. Outlined in the Subject section of this course summary of enquire about a course brochure for more info. With a focus on realworld learning, this qualification ensures you graduate with the skills and practical experience employers are looking for. You may choose to take on the challenge of leading your workplace’s cyber security management strategy, or seek new work in the cyber security sector. Whichever path you take, this graduate certificate prepares you to meet the challenges of a rapidly changing and exciting digital business world.

VISIT HERE

86

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


FEATURING FREE SECURITY TRAINING RESOURCES THAT ARE AIMED AT INCREASING SECURITY AWARENESS AND HELPING PEOPLE BUILD AND UPSKILL THEIR SECURITY SKILLS.

MASTER OF CYBERSECURITY Work on the frontlines of hacking, cybercrime and defence strategies. Launch your career and join a fast-growing industry with La Trobe’s 100% online, ACS-accredited Master of Cybersecurity, whether you have an IT background or not. You’ll study cyber law and risk management, ethical hacking and defence, artificial intelligence and machine learning, secure programming, project and database management and more.

SECURITY ANALYST This course is designed for anyone who wants to understand the analysis of data security. More than ever, information security analysts are needed to rescue companies when they have been hacked or breached, as well as to put in place controls and counter-measures to avert cyber attacks

You can study anywhere, anytime, completely online.

Gain the skills required to detect and mitigate information and cyber security threats and vulnerabilities. The security analyst role is an entry point to many other security specialties and is highly in-demand in today’s evolving threat environment.

VISIT HERE

VISIT HERE

GRADUATE CERTIFICATE IN DATA ANALYTICS AND CYBER SECURITY Combine two of today's most crucial ICT skills, data analytics and cyber security, into a single qualification in this graduate certificate. You'll learn how to analyse vast quantities of data in order to extract intelligence for commercial planning and how to secure that data from privacy and security breaches. Knowledge in these areas is highly soughtafter in today's digitally disrupted economy.

VISIT HERE

CERTIFICATE III IN INFORMATION TECHNOLOGY (ELECTIVE FOCUS BASIC CYBER SECURITY) You’ll learn how toInstall and optimise operating system software; Identify and report online security threats; Promote workplace cyber security awareness and best practices. Lumify Learn will recognise any relevant skills and experience you’ve developed to date, and provide clear pathways for further education and career development. By enrolling in the course, you’ll be eligible to take part in the Lumify Learn Industry Partner Program, in which they connect you with those recruiting for current roles in the job market.

VISIT HERE

I S S U E 17

WOMEN IN SECURITY MAGAZINE

87


THE LEARNING HUB OFFENSIVE CYBER SECURITY AND PENETRATION TESTING This subject introduces you to the practical approaches taken in Red Teaming – simulating aggressors in a cyber security penetration testing environment. The subject will be practical task focused and allow you to explore the penetration testing process from inception to completion with a focus on three key areas: Legal and Ethical considerations; conducting penetration testing; and reporting findings.This subject builds on concepts of learning through practice in Year 1 of study by introducing you to more complex learning experiences.

VISIT HERE

MASTER OF CYBERSECURITY Swinburne is a world leader in online education by using interactive and innovative technologies to deliver our courses and degrees. From vocational education and undergraduate to postgraduate study, Swinburne has online study options at all levels.

VISIT HERE

Reach out to Aby today to find out how your company can help support the Women in Security Magazine. ABY@SOURCE2CREATE.COM.AU

88

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Need Data Admin Services

Tell us more about your data Need Data appending services? Need database admin cleaning Data enrichment services

Data Entry Admin services Data Verification services

LET US HELP YOU OVERCOME YOUR BUSINESS DATA CHALLENGES PARTNER WITH A QUALITATIVE FAST-WORKING TEAM Our team understand the importance of time and efficiency when it comes to data projects.

With:

aby@source2create.com.au charlie@source2create.com.au source2create.com.au


TURN IT UP

POWERHOUSE WOMEN

SHE DID IT HER WAY

FOLLOW THE LEADER

With Lindsey Schwartz

With Amanda Boleyn

With Chanel Christoff Davis

How do I figure out what my purpose is? How do I connect with likeminded women? How do I overcome imposter syndrome? How do I grow my money mindset? Welcome to Powerhouse Women, the podcast! Host Lindsey Schwartz will bring you everything you need to turn your ideas into your dream business with tactical tips, business strategy and all of the mindset shifts you need to take on your business, side hustle or passion project with confidence!

She Did It Her Way is a podcast where we dive into all of your most important questions about starting a business and when to take the leap of going full-time as an entrepreneur. Every week, host, Amanda Boleyn delivers fresh content on productivity hacks, different business strategies, how to confidently transition out of your 9-5 and become a fulltime business owner. Along with sharing her business savvy tips, she interviews women who have also gone out and done it.

Follow the Leader features dynamic women entrepreneurs and their journeys to becoming a success in business. It's an inspirational space for entrepreneurs, future entrepreneurs, and thought leaders as they share their keys to success. Chanel Christoff Davis is the CEO and founding partner of the largest woman and minority owned sales tax advisory practice in the country, Davis Davis & Harmon LLC.

CLICK TO LISTEN

CLASSY CAREER GIRL With Anna Runyan The platform focuses on teaching women the different transitions in their careers. This platform was named by Forbes as one of the 35 most influential career sites. What should you expect to find in Anna’s podcasts?Career success stories Tax tips for entrepreneurs and small business owners Networking ,Brand awareness, Marketing , Anna’s journey Interview with businesswomen.

CLICK TO LISTEN 90

W O M E N I N S E C U R I T Y M A G A Z I N E

CLICK TO LISTEN

WOMEN IN TECHNOLOGY SPOTLIGHT With Ronke Babajide A space where I talk to women working in IT across the spectrum of different roles. We will discuss our career journey, visions, obstacles, roles, our views on the industry, what we love and why we are here to stay.

CLICK TO LISTEN

CLICK TO LISTEN

WOMEN AT WORK PODCAST With Sarah Green Carmichael This podcast is hosted by Sarah Green Carmichael, Nicole Torres, and Amy Bernstein, who are also editors at Harvard Business Review. It focuses on exploring the place and the plight of women in the corporate world.

CLICK TO LISTEN N O V E M B E R • D E C E M B E R 2023


WINGS OF INSPIRED BUSINESS

AMA PRIORITIZING EQUITY

With Melinda Wittstock

With Aletha Maybank

Women entrepreneurs are changing the game of business, stepping into our authentic feminine power and growing consciousness to start and scale great companies. Listen to Wings podcast, you'll learn how to manifest the mindset, mojo, and money to create, grow and scale a business aligned with what makes your heart sing. Host Melinda Wittstock masterminds daily with other successful women entrepreneurs who share their secrets, success tips, & 'fail forward' epiphanies in this motivating podcast.

Prioritizing Equity illuminates how determinants of health uniquely impact marginalized communities, public health and health equity, with an eye on both short-term and long-term implications.Prioritizing Equity is produced by The AMA Center for Health Equity and hosted by AMA Chief Health Equity Officer & Senior Vice President, Aletha Maybank, MD, MPH. Listeners can earn CME while gaining valuable lessons in racial justice and health equity from leading voices in medicine and health care.

CLICK TO LISTEN

I S S U E 17

CLICK TO LISTEN

INSPIRING WOMEN With Raimonda Jankunaite Inspiring Women Stories Podcast by Women in Business Club, with your host, serial entrepreneur, mentor, and speaker Raimonda Jankunaite. In these series, we interview our Community Members, Women from all around the world who run own businesses. Through these podcast interviews, you will get to hear about personal stories of entrepreneurs, their journeys, lessons, & obstacles. Every episode will have valuable lessons and entrepreneurial advice to start own business and/or transition in your career, personal growth, & business.

CLICK TO LISTEN

WOMEN IN SECURITY MAGAZINE

91


OFF THE SHELF

DROP THE BALL: ACHIEVING MORE BY DOING LESS Author // Tiffany Dufu Drop the Ball is a masterclass in work-life balance. Many women struggle to juggle families, work, and outside obligations while aiming to “have it all.” Tiffany Dufu gives women permission to stop striving to excel in every area, cease trying to please everyone, and focus on a narrower set of goals. As the title suggests, the author implies that by doing less, women can be more productive, effective, and successful. The book encourages readers to embrace imperfection and prioritize the most important objectives rather than trying to do everything and be the best at everything. Drop the Ball is a recipe for living a less hectic, more fulfilled life.

BUY THE BOOK

HOW TO CHANGE Author // Katy Milkman How to Change is one of the best new employee development books. Wharton professor Katy Milkman examines the science behind behavior shift and outlines the optimal conditions for making lasting transformations. The book draws on research and case studies to show how timing and temptation can affect the results of efforts to change. Chapters cover topics such as procrastination, confidence, and impulsivity, and help readers better understand the psychology behind forming new habits and making a permanent switch. True to its name, How to Change is an actionable guide for self-growth and evolution.

BUY THE BOOK

DO IT LIKE A WOMAN: ... AND CHANGE THE WORLD Author // Caroline Criado-Perez Doing anything 'like a woman' used to be an insult. Now, as the women in this book show, it means being brave, speaking out, and taking risks, changing the world one step at a time.

BUY THE BOOK

RADICAL CANDOR (BE A KICK-ASS BOSS WITHOUT LOSING YOUR HUMANITY) Author // Kim Scott Radical Candor is a rulebook for leading with a blend of honesty and empathy. The book lays out management tips for being tough and forthright and having high standards, yet still honoring and respecting employees. This work provides a blueprint for giving effective feedback while maintaining positive relationships with staff. Radical Candor explains how to be assertive, honest, and more effective at work and beyond, and gives tips for being a good boss.

BUY THE BOOK

92

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


THAT’S WHAT SHE SAID: WISE WORDS FROM INFLUENTIAL WOMEN Author // Kimothy Joy “A stunning book that celebrates a diverse group of inspirational women, from Maya Angelou to Malala Yousafzai. The book features illustrations and quotes with illuminating biographies to inspire women of all ages and backgrounds.” – Hello Sunshine

BUY THE BOOK

THE MOMENT OF LIFT Author // Melinda Gates "The Moment of Lift is an urgent call to courage. It changed how I think about myself, my family, my work, and what’s possible in the world. Melinda weaves together vulnerable, brave storytelling and compelling data to make this one of those rare books that you carry in your heart and mind long after the last page." - Brené Brown, Ph.D., author of the New York Times #1 bestseller Dare to Lead

BUY THE BOOK

LIFE IN CODE: A PERSONAL HISTORY OF TECHNOLOGY Author // Ellen Ullman Part memoir, part collection of essays, veteran programmer Ellen Ullman’s most recent book paints a vivid picture of what it was like to be a woman engineer during the early days of the dotcom boom. Life in Code is packed with fascinating anecdotes (like the time the Google co-founders offered Ellen a job at a party and she turned it down) and meaningful reflections about the power of programming. BTW, if you haven’t read her hit 1997 book Close to the Machine, you should definitely add that one to your list, too!

BUY THE BOOK

THE MEMO: WHAT WOMEN OF COLOR NEED TO KNOW TO SECURE A SEAT AT THE TABLE Author // Minda Harts The Memo is one of the best business books for women of color. Consultant and speaker Minda Harts addresses the unique challenges women of color face in the corporate world and offers practical, customized career advice for members of these underrepresented groups. The book illuminates the barriers that often prevent nonwhite women from rising to leadership position or high-ranking roles. The author shares strategies and tips for overcoming these obstacles and gaining influence and power in resistant environments. The Memo acts as a playbook for ambitious women of color, as well as a guide for allies looking to better support colleagues and build fairer work environments.

BUY THE BOOK

I S S U E 17

WOMEN IN SECURITY MAGAZINE

93


OFF THE SHELF

INNOVATING WOMEN: THE CHANGING FACE OF TECHNOLOGY Author // Vivek Wadhwa and Farai Chideya Though it was published nearly a decade ago, this powerful book of essays and firstperson anecdotes written by women in STEM is still relevant today. Each chapter is a separate crowd-sourced essay by a woman whose work involves innovation and entrepreneurship, including some big names in tech, like Megan Smith, former Google VP and Chief Technology Officer of the United States, Kim Polese, who was the founding product manager for Java, and Silicon Valley venture capitalist Heidi Roizer. Innovating Women sheds important light on the meaningful contributions women have made in the tech industry, while also acknowledging the realities of gender bias.

BUY THE BOOK

THE WOMAN WHO SMASHED CODES Author // Jason Fagone This is a fascinating true story about Elizebeth Smith, a woman who went from studying languages and Shakespeare to becoming America’s first female cryptanalyst. Elizabeth was highly skilled in “code-breaking,” which is a process of decrypting code or cipher messages to uncover hidden information. She worked as a cryptanalyst during both World Wars, and went on to work for the U.S. Navy, Treasury, Coast Guard, and Army.

BUY THE BOOK

FEMALE INNOVATORS AT WORK Author // Danielle Newnham This book describes the experiences and successes of female innovators and entrepreneurs in the still largely male-dominated tech-world in twenty candid interviews. It highlights the varied life and career stories that lead these women to the top positions in the technology industry that they are in now.

BUY THE BOOK

LEAN IN: WOMEN, WORK, AND THE WILL TO LEAD Author // Sheryl Sandberg In 2010, [Sandberg] gave an electrifying TED talk in which she described how women unintentionally hold themselves back in their careers. Her talk, which has been viewed more than six million times, encouraged women to “sit at the table,” seek challenges, take risks, and pursue their goals with gusto.

BUY THE BOOK

94

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Want to sponsor an event but have no one to execute it? Need stand out booth designs? Merchandise & Prize giveaways Booth social media presence Booth set up and pack down Booth staffing Booth marketing

LET US HELP YOU OVERCOME YOUR EVENT MANAGEMENT CHALLENGES

We can execute anywhere in Australia, REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.

With:

aby@source2create.com.au charlie@source2create.com.au source2create.com.au


SURFING THE NET

BLACK WOMEN IN TECH By Black Women In Tech Get the latest news and updates from our community, members' stories, new opportunities and more! Global Tech Advocates Black Women In Tech, formerly known as TLA Black Women In Tech, is a not-for-profit global organisation, based in London, dedicated to building bridges of opportunities in tech by enabling black female talents to excel and companies to have access to black women of talent. We are a community of black women tech advocates of all levels and allies who support and empower diversity and inclusion.

SEE GIRL WORK By See Girl Work Girl Work is a curation of work & lifestyle content for creative, entrepreneurial-minded women doing it for themselves. We publish content on topics related to freelance living, entrepreneurship, and career strategies. We feature profiles and interviews with women who are creating their own lifestyles on their own terms.

EVERY WOMAN IN TECHNOLOGY By Amy Gritzinger This blog will journal my pursuit of STEM education and careers for women and girls of all ages. Science, Technology, Engineering, and Math. I'm Amy Gritzinger, Technical Support Engineer, ViceChair Membership Committee at The Coordinate Metrology Society, FIRST Lego League Coach, STEM Advocat an panel speaker.

READ BLOG

READ BLOG

TAKE THE LEAD

BUILT BY GIRLS

By Amy Zerba

By Rhonisha Ridgeway

Take The Lead prepares (with learning programs), develops (with mentoring), inspires (with role models) and propels (with thought leadership and movement building for systems change) women to take their fair and equal share of leadership positions across all sectors by 2025.

Challenging young women to be builders, creators, and innovators the protagonists in their own lives. Built By Girls is building the next wave of tech leaders - who just happen to be girls. We give young women the exposure, skills and network they need to get their first job in tech. We're her secret women.

READ BLOG

READ BLOG 96

W O M E N I N S E C U R I T Y M A G A Z I N E

READ BLOG N O V E M B E R • D E C E M B E R 2023


FINGENT | IDEAS TO MOTIVATE BUSINESS GROWTH By Fingent Sign up to get the latest updates and insights on IT solutions like custom software and application development that will help your business to solve complex challenges.

READ BLOG

DFIR DIVA By Ryan Chapman Digital forensics and incident response blog geared toward beginners. Hello! My name is Elan and I've been working as an Incident Response Analyst since May of 2019. My purpose for creating this site is to share the resources I use as I learn and grow in this field to help others who are interested in Digital Forensics & Incident Response (DFIR).

THE WOMEN IN TECH SUMMIT By WITS Get the latest conference news and announcements from WiTS. The Women in Tech Summit is a series of events that inspire, educate and connect women in all types and at all levels of technology careers.

READ BLOG

READ BLOG

ALI'S BLOG By Ali Brown

THE GLASS HAMMER

SHE OWNS IT BLOG

By Sylvana Q.

By She Owns It

The Glass Hammer is an awardwinning blog and online community created for women executives in finance, law, technology and big business. Our goal is to Inform, Empower and Inspire professional women with our content and our network.

Features guest posts on the latest Entrepreneurial practices, tips, and advice on management, along with buzzing trends and lifestyle profiles. She Owns It is a media marketing company blog that focuses on female individuals in corporate to help grow their careers.

READ BLOG I S S U E 17

READ BLOG

If you are a go-getter who enjoys driving *results* through creative, targeted marketing strategies.. and would love working with an entrepreneurial organization that powers up women business leaders, this could be the perfect position for you. The Trust, the new, premier network for high-level female entrepreneurs led by awardwinning business mentor Ali Brown, is seeking a Growth Marketing Director to take our membership to the next level and beyond. We are a small team with big dreams.

READ BLOG WOMEN IN SECURITY MAGAZINE

97


Championing the women who keep us all safe

At NAB, a career in security is everything you make it. For Emma, Jalpa and Heidi, they’re empowering and inspiring more women and non-binary people to join the field. As a proud sponsor and supporter of the Australian Women in Security Network awards, we couldn’t be more excited to celebrate them as our three nominees.

Emma Neville

Jalpa Bhavsar

Heidi Winter

NOMINEE FOR

FINALIST FOR

NOMINEE FOR

Australia’s Most Outstanding in IT Security

Best Security Mentor NOMINEE FOR

Cybersecurity Champion

Best Volunteer

It’s finding your superpowers It’s more than a career at NAB. More opportunity. More moments to make a difference. More focus on you. Find your future career at nab.com.au/careers ©2023 National Australia Bank Limited ABN 12 004 044 937 AFSL and Australian Credit Licence 230686. A174588-0923


2023

#2023WISAWARDS


CELEBRATING EXCELLENCE: UNVEILING THE 2023 AUSTRALIAN WOMEN IN SECURITY AWARDS WINNERS by Abigail Swabey

The 2023 Australian Women in Security Awards

The event would not have been possible without

ceremony was more than just an event, it was

the support of sponsors like KPMG, the Australian

a celebration of authenticity, diversity and the

Signals Directorate, CyberCX, AusCERT, TAL Australia,

unmasking of our true selves. In a world where we

Everbridge, Sekuro, TrendMicro, NAB, Equifax,

often wear masks to project strength and courage,

Monash University and ISACA’s One-In-Tech. These

these awards encourage us to break free from those

sponsors share the vision of diversity, inclusion and

shields and embrace who we truly are. The power of

progress in the security industry.

authenticity, multiplied across countless individuals, has the potential to transform industries and

Under the theme Unmasking the Future of the Security

dismantle barriers of judgement and prejudice. It's a

Industry, the 2023 awards recognised and celebrated

rebellion that shatters the mould, fostering diversity,

winners, highly commended honourees and those

inclusivity and belonging.

deserving of special recognition. These individuals, initiatives and organisations have made incredible

This year's awards ceremony brought together a

contributions to the security community, propelling

record-breaking audience of 450 attendees, both in

us toward new heights.

person and via live streams from across the nation.

100

What began with just 200 attendees in 2018 has

The 2023 Australian Women in Security Awards

evolved into a vibrant celebration of excellence in

were a testament to the power of authenticity and

security, thanks to the dedication of individuals

diversity. They showcased the strength of individuals

like Charlie-Mae Baker and George Innis who

and organisations committed to shaping the security

meticulously crafted every detail.

industry's future. As the awards ceremony unfolded

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


it became a night of recognition and celebration, and

BEST SECURITY MENTOR

a reminder that, when we unmask our true selves, we

Winner: Asou Aminnezhad

pave the way for a brighter, more inclusive future.

Highly Commended: Jalpa Bhavsar Special Recognition: Sandy Assaf

Here are the deserving winners in each category.

BEST SECURITY STUDENT BEST VOLUNTEER

Winner: Eleni Lykopandis

Winner: Bronwyn Mercer

Highly Commended: Bethany Balazs

BEST PROGRAM FOR YOUNG INDIVIDUALS IN SECURITY

Winner: Rachell DeLuca

PROTECTIVE SECURITY CHAMPION

Winner: Purple Team Australia Highly Commended: ASD CyberEXP

THE ONE TO WATCH IN PROTECTIVE SECURITY

AUSTRALIA’S MOST OUTSTANDING IN PROTECTIVE SECURITY

Winner: Nadia Hammoud Special Recognition: Michelle Lee

Winner: Christina Rose Highly Commended: Amy Hewson

UNSUNG HERO Winner: Mina Zaki

BEST INDUSTRY INITIATIVE THAT SUPPORTS DIVERSITY, INCLUSION AND EQUALITY

Highly Commended: Gabriela Guiu-Sorsa

Winner: Purple Team Australia

BEST PLACE TO WORK IN SECURITY

Highly Commended: nbn’s Security Group Diverse

Winner: MF & Associates

Talent Program

Highly Commended: Equifax

I S S U E 17

WOMEN IN SECURITY MAGAZINE

101


CHAMPION OF CHANGE

WHAT SOME ATTENDEES SAID:

Winner: Matt Tett

"Attending this event was an incredible experience.

Highly Commended: Masseh Haidary

I had no idea what to anticipate, but it completely exceeded my expectations. Phenomenal!"

CYBERSECURITY CHAMPION Winner: Eva Chen

"I'm very grateful to have had the opportunity to

Highly Commended: Jess Dodson

attend the Women in Security Awards event. The

Special Recognition: Anubha Sinha

evening was nothing short of spectacular, filled with the brilliance of the cybersecurity industry's shining

AUSTRALIA’S MOST OUTSTANDING IN IT SECURITY

stars. Your thoughtful invitation and the meticulous

Winner: Lisa Currie

Can't wait for the event next year and hope to attend

organisation made it an unforgettable experience. it with the family. I do want to take a moment to

BEST INNOVATIVE BUSINESS RESHAPING THE FUTURE OF THE SECURITY INDUSTRY

express my deepest gratitude for including me in

Winner: AustCyber

successfully celebrated achievements but fostered a

Highly Commended: SecureCode Warrior

sense of unity and inspiration in all the attendees."

BEST SECURE CODER

"Lots of fun to be at the #2023WISAwards last night.

Winner: Medha Mishra

Thanks, Abigail Swabey. It was a fantastic celebration

such a meaningful occasion. The event not only

of women in #cyber. So many entries and so many

MOST INNOVATIVE EDUCATOR IN CYBERSECURITY

worthy winners."

Winner: Tech Inclusion, for the Girls’ Programming

The 2023 Australian Women in Security Awards

Network

celebrated the excellence, dedication and innovation of individuals and organisations in the security

102

CONVERGED SECURITY RESILIENCE CHAMPION

industry. The theme for 2024 promises to reflect on

Winner: Jacinta Thomson

future as we continue to shape the security industry

Winner: Chelsea Capizzi-Walsh

into a more diverse and inclusive space.

W O M E N I N S E C U R I T Y M A G A Z I N E

the progress made and ignite imaginations for the

N O V E M B E R • D E C E M B E R 2023


Cyber security is not what you do, it’s who you are. KPMG Cyber Security

Martijn Verbree

Luke Eason

Danny Flint

Matt O’Keefe

Mitra Minai

Gergana Winzer

Head of Cyber Security

Head of Technology Risk

Identity and Access Management

Cyber Security ASPAC Lead

Global Healthcare Lead & National Cyber Partner Health and Victoria Government

Mid-Market

Natasha Passley

Gregory Miller

Stuart Mort

Kelly Henney

Anna Poole

Veronica Scott

Financial Services

Government Cyber and Critical Infrastructure Security

Technology and New South Wales Government

Privacy and Data Protection

Energy Mining and Property

Law

Ross Widdows

Philippe Baker

Paul Black

Matt Dri

Angela Pak

Simon Martin

Corporates

Cyber Security Defense Lead

Incident Response and Intelligence

Investigations

Operational Technology

Technology Risk Financial Services

KPMG.com/au © 2023 KPMG, an Australian partnership. All rights reserved.


Cybersecurity Champion SPONSORED BY

WINNER Eva's dedication to mentoring aspiring cybersecurity professionals through the AWSN program, thereby shaping the future of the industry, is truly commendable. Her influence extends beyond the program, reaching current security practices, where she has instilled a security culture in agile software development processes. Eva has offered valuable guidance on privacy, the Information Security Manual, and risk assessments, leaving a lasting impact on the industry.

Eva Chen GRC Consultant

Her multifaceted approach aims to strengthen security practices across diverse organizations while nurturing cybersecurity talent. Eva's mentoring initiatives and work programs illustrate her active championing of cybersecurity, both within and outside her organization, all while providing essential support for women in the field.

HIGHLY COMMENDED

Jess is celebrated for her dedicated advocacy for women in the tech industry, harnessing her social media presence to inspire and educate, consistently sharing invaluable insights on digital security. Her impact reaches far beyond the digital realm, evident through her conference presentations and podcast appearances.

Jessica Dodson Senior Cloud Solution Architect, Microsoft

104

W O M E N I N S E C U R I T Y M A G A Z I N E

Jess's unwavering commitment to championing women in the fields of security and IT is truly commendable. She plays a vital role in increasing female representation in the industry and serves as a visible source of inspiration for women, providing them with the opportunity to see someone who mirrors their own potential.

N O V E M B E R • D E C E M B E R 2023


SPECIAL RECOGNITION

Anubha's journey of triumph over adversity is nothing short of inspirational. She generously shares this inspiration through her active involvement in the "Women of Identity" initiative at KPMG, and her potential to make a significant impact beyond her company is genuinely remarkable. Anubha's impressive achievements and unwavering resilience distinguish her as an exceptional leader in the security industry who uplifts others. Anticipation surrounds her future endeavors, and we expect even greater accomplishments from her in the years to come.

Anubha Sinha Director Digital Trust and Identity, KPMG

You’re a fearless innovator. Proud sponsor of the 2023 Australian Women in Security Awards. Explore where a career in Technology at KPMG could take you. Life at KPMG – KPMG Australia.

KPMG.com/au

I S S U E 17

© 2023 KPMG, an Australian partnership. All rights reserved.

WOMEN IN SECURITY MAGAZINE

105


Cybersecurity Champion SPONSORED BY

FINALISTS

NOMINEES

Jessica Dodson

Adara Campbell

Jessica Dodson

Senior Cloud Solution Architect Microsoft

Alex Nixon

Jessica Warburton

Alex Reale

Laiba Samar

Chief Growth Officer Secolve

Alisha Hummel

Lauren Veenstra

Anubha Sinha

Madhumita Iyer

Holly Wright

Asou Aminnezhad

Mahwash Mansoor

Belinda Burton

Martena Lawson

Eva Chen

Belinda Noel

Melanie Timbrell

GRC Consultant

Cara Wilkins

Melissa Misuraca

Elysha Padasian

Monica Zhu

Emily Ogilvie

Nikki Saunders

Emma Seaman

Olivia Preece

Eva Chen

Pooja Sharma

Farhana Dawood

Prachi Purohit

Gabriela Guiu-Sorsa

Ruby Prinu

Heidi Winter

Saba Bagheri

Holly Wright

Stephanie Gray

Jana Dekanovska

Tanu Bains

Jazmin Vergan

Thiri Ma Thiri Htay

Jen Waugh

Tori Elphick

Belinda Noel

Security Architect IBM

Emma Seaman Incident Response Analyst Fortinet

Anubha Sinha Director Digital Trust and Identity KPMG

Jenny Green

106

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


IN THE SPOTLIGHT WITH EVA CHEN: WINNER OF THE CYBERSECURITY CHAMPION AWARD In a recent interview, we had the privilege of speaking with Eva Chen, recognised as Cybersecurity Champion in the 2023 Australian Women in Security awards. She has shared insights into her journey and experiences, shedding light on her notable contributions to the field and her dedication to mentoring the next generation of cybersecurity talent. Eva joined the cybersecurity industry just one and a half years ago, bringing a wealth of expertise in application development, project management and organisational change management from the public service sector. Her journey in cybersecurity has been marked by a commitment to delivering security outcomes, fostering a security culture, addressing cybersecurity concerns and enhancing cybersecurity capabilities for clients. Beyond her work with clients she has also been instrumental in sustaining the cybersecurity industry by imparting her knowledge and experience to aspiring cybersecurity professionals. This commitment led Eva to participate in the Australian Women in Security Network (AWSN) mentoring program where she mentored individuals seeking to enter cybersecurity, and those new to it. Her goal was to make a lasting difference by not only helping

I S S U E 17

WOMEN IN SECURITY MAGAZINE

107


organisations enhance their security but also by

COMMITMENT TO DIVERSITY

nurturing cybersecurity talent for the future.

In addition to her mentoring efforts, Eva's journey has been marked by a commitment to diversity and

UNWAVERING MOTIVATION

inclusivity in the cybersecurity industry. She has

Despite being relatively new to cybersecurity Eva has

actively promoted these values by sharing her own

displayed unwavering motivation and dedication.

experiences as a female with a culturally diverse

She has actively pursued self-improvement by

background. Her advice to newcomers emphasises

participating in the AWSN Incident Response

building a support network, setting realistic goals,

competition, studying for the Certified Risk in

being open to exploration and pivoting within the

Information Security Controls (CRISC) certification

industry.

and attending industry events and workshops. Her dedication to continuous learning and growth

Looking to the future, Eva views her recognition

led to her being selected for the AWSN Emerging

as a cybersecurity champion as an honour and a

Leadership program sponsored by the Australian

testament to her commitment to the industry. Her

Signals Directorate (ASD).

aspirations include continuing to mentor and sustain the next generation of cybersecurity professionals,

One of the notable aspects of Eva’s career is her role

regardless of age, gender or background. She aims

as a mentor in the AWSN mentoring program through

to empower others to make a meaningful difference

which she has had mentees in different regions

in the ever-evolving landscape of cybersecurity.

of Australia. She has helped individuals enter the cybersecurity industry, provided guidance on various

Eva's journey exemplifies her dedication, mentorship

cybersecurity domains and on the differences

and commitment to diversity and inclusivity in

between government and the private sector.

the cybersecurity industry. Her story serves as an inspiration to aspiring cybersecurity professionals

Eva’s achievements and contributions have been

and underscores the importance of fostering the

widely recognised by her mentees and colleagues

growth and sustainability of talent in this critical

who acknowledge the positive impact she has made

industry.

on their careers. These testimonials reflect how Eva has empowered others to succeed in cybersecurity.

108

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


2024

CALL FOR EXPRESSION OF INTEREST

BECOME A SPONSOR TODAY EVENT DATE: THURSDAY | 10 OCTOBER 2024

If you're part of an organisation dedicated to promoting diversity and inclusion, we'd love to discuss our 2024 Awards packages with you. These packages are designed to further our shared mission of recruiting, retaining, and advancing women in the cybersecurity workforce.

CONTACT Aby@source2create.com.au or Charlie@source2create.com.au

By becoming a sponsor and supporting our event, you'll visibly demonstrate your commitment to celebrating diversity and recognising accomplishments within the security industry.


BUILDING BUSINESS RESILIENCY BY HELPING CIOS AND CISOS TAKE A STRATEGIC APPROACH TO CYBER SECURITY RISK MITIGATION AND DIGITAL TRANSFORMATION GOVERNANCE, RISK, & COMPLIANCE OFFENSIVE SECURITY TECHNOLOGIES & PLATFORMS MANAGED SECURITY SERVICES ROLE BASED CONSULTING

sekuro.io


Best Volunteer WINNER

Bronwyn Mercer Cybersecurity Architect, Microsoft

FINALISTS

Alexandra (Alex) Penna Chief Operating Officer Tech Inclusion/Girls' Programming Network

Bronwyn Mercer

Bronwyn's exceptional contributions, fueled by her technical prowess and a deep-seated passion for making a positive difference, truly distinguish her. Her steadfast dedication to cybersecurity and safety, coupled with her advocacy for underrepresented groups, positions her as an outstanding leader.

NOMINEES

Akansha Pandey Alexandra (Alex) Penna Baby Lyn Nagayo Bronwyn Mercer

Cybersecurity Architect Microsoft

Cherie Barringhaus

Akansha Pandey

Chloe Choy

Information Security Specialist Telstra

Emily Wingard Fiona Byrnes Jalpa Bhavsar Karen Hobson Meidi van der Lee Michelle Gatsi Shelly Mills

I S S U E 17

WOMEN IN SECURITY MAGAZINE

111


Best Secure Coder SPONSORED BY

WINNER

Medha's excellence in the security industry is evident through her innovative projects, such as security dashboards and gamification, which illuminate her commitment to advancing the field. Her leadership in introducing Application Security not only reduces vulnerabilities but also nurtures a security-first mindset among her peers and colleagues.

Medha Mishra Application Security Engineer, PaperCut Software

Medha's versatility, effective communication, and unwavering commitment to mentoring serve as an inspiration to the next generation of cybersecurity professionals. Her proactive vision for secure code reviews and incident recovery further solidify her well-deserved recognition, leaving a lasting and significant impact on the cybersecurity landscape.

FINALISTS

NOMINEES

Anisa Taj

Anisa Taj

Application Security Engineer The NRMA

Fadzayi Chiwandire

Fadzayi Chiwandire Security Consultant (Application Security) CyberCX

Medha Mishra Nancy Patel

Medha Mishra Application Security Engineer PaperCut Software

Nancy Patel Analyst Deloitte

112

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


You’ll be at the forefront of cyber security and part of a diverse team at ASD.

Play OPERATION CYBER and see if you have what it takes to protect Australia from cyber threats.

www.asd.gov.au

Play Now


IN THE SPOTLIGHT WITH MEDHA MISHRA: WINNER OF THE BEST FEMALE SECURE CODER AWARD In the ever-evolving realm of cybersecurity the

required, beyond technical skills, include a relentless

importance of secure coding cannot be overstated.

desire to learn and adapt. Early in her career Medha

As winner of the Best Secure Coder award, Medha

was fortunate to have exceptional mentors who

Mishra's journey into the world of secure coding has

invested time in nurturing her skills, making a

been nothing short of inspirational. Let's dive into her

significant difference in her development.

story and explore the insights she has to offer. As an expert in the application security space she

FROM CURIOSITY TO COMMITMENT

emphasises the importance of understanding

Medha's fascination with cybersecurity began at a

and addressing the shortcomings of DevSecOps

young age, just 14. Her journey into this complex

practices, such as developers' reluctance to engage

field was sparked by a rather amusing incident at

with application security testing results. Identifying

her high school. A fellow student had made an ill-

such pain points can lead to innovative solutions.

advised attempt to use their father's credit card on

For example, the introduction of a security sprint can

a dubious website, creating a chain of events that

help tackle backlog issues, or the creation of a unified

ultimately led to the entire school being addressed by

view from multiple security tools can streamline

a cybersecurity specialist. The talk delivered by this

application security testing.

expert left a lasting impression on Medha, igniting her passion for the world of security.

SECURE CODING IN ACTION In the cybersecurity landscape, challenges are a

In those early days her focus was primarily on

constant. One such challenge emerged during the

encryption. However, as she delved deeper into the

Log4j vulnerability incident. Medha had to swiftly

world of programming, her path took a different

assess the impact surface because the existing tools

course.

did not effectively detect and update already scanned projects. She devised workarounds to identify

SKILLS AND QUALITIES OF A SECURE CODER

vulnerable dependencies and initiate an appropriate

In Medha's view, secure coding is not a discipline

response.

radically different from coding. The key qualities

114

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


ADVICE FOR ASPIRING WOMEN IN CYBERSECURITY Medha's advice to aspiring women in cybersecurity is straightforward: tech is a fantastic field with fascinating work and substantial rewards. The potential isolation caused by the gender gap should not deter anyone from joining the industry. Women may be a minority in cybersecurity, but pioneers like Medha and her manager, Rebecca Tillman, have achieved remarkable feats. Joining the industry is the first step, and it holds the promise of fulfilling work and enduring friendships.

PROMOTING CYBERSECURITY AWARENESS As winner of the Best Secure Coder award, Medha hopes to reshape the perception that innovation and security are competing priorities. Her aim is for DevSecOps practices to be seen as the new norm, seamlessly integrated into the development process. Rather than innovation and security being competing priorities they should be partners in safeguarding the digital world.

INNOVATIVE APPROACHES AND STRATEGIES

published by the Open Web Application Security

Medha's innovative approach includes gamified

Project (OWASP) and security vendors. Engaging

dashboards that engage developers with scanning

with developer communities keeps her current with

tool results. This unique method makes it easier

emerging technologies. She also keeps an eye on

for developers to interact with security findings.

cybersecurity news outlets, ensuring she remains

She is also exploring the inclusion of a countdown

aware of the latest CVEs and threats.

timer into service level agreements covering these dashboards to enhance urgency.

COLLABORATION IN CYBERSECURITY Successful projects in cybersecurity often have

OVERCOMING GENDER CHALLENGES

top management buy-in. When C-suite executives

The challenges faced by women in cybersecurity are

understand and support cybersecurity initiatives,

multifaceted, and there is no one-size-fits-all solution.

projects tend to progress more smoothly.

One persistent issue, particularly concerning working mothers, is the perception that women are less

A VISION FOR THE FUTURE

available for work. Medha believes the widespread

Winning the Best Secure Coder award holds deep

adoption of remote work, post COVID, should render

personal significance for Medha. It connects her to

this misconception obsolete. Parenthood should not

a network of remarkable women in cybersecurity,

be a barrier to career advancement.

including her first female boss, Hannah McKelvie, who received the same award in 2019. Medha hopes

STAYING UPDATED IN CYBERSECURITY

to inspire more women to join the tech industry,

The ever-evolving nature of cybersecurity demands

enriching it with diverse perspectives and talent.

constant learning. To stay informed, Medha regularly

The world of tech is extraordinary, and with more

immerses herself in the vast volumes of content

women participating, it can only become better.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

115


Unsung Hero SPONSORED BY

WINNER Mina is recognised for her tireless efforts in championing women, culturally diverse individuals, and those exploring careers in cybersecurity, thus broadening the industry's horizons. Her multifaceted impact extends from aiding tech job seekers to mentoring newcomers in the industry, guiding startups, and actively contributing to the community.

Mina Zaki Cyber Alliances Lead, KPMG

Mina brings a compassionate and human touch to cybersecurity, transcending the industry to create a tangible difference in the lives of women and children in Afghanistan. Her role in establishing and nurturing an Indigenous Cyber Company further exemplifies her unwavering commitment to diversity and inclusion. Mina's dedication to helping others succeed serves as a testament to her character and her belief that we all rise together.

HIGHLY COMMENDED

Gabriela Guiu-Sorsa Cyber Security Adviser

116

W O M E N I N S E C U R I T Y M A G A Z I N E

Gabriela's unwavering dedication to cybersecurity and inclusivity shines through her roles as a mentor, ambassador, and AWSN Strategic Adviser. Her initiative, "Cyber Security Champions of Tomorrow," designed to empower women and minority groups, has played a pivotal role in securing new opportunities in the cybersecurity field. Gabriela's personal journey and resilience serve to amplify her advocacy, and her steadfast efforts have undeniably contributed to enhancing diversity and inclusivity within the industry.

N O V E M B E R • D E C E M B E R 2023


FINALISTS

NOMINEES

Mina Zaki

Alethea Fu

Lisa Lay

Cyber Alliances Lead KPMG

Amanda Lee

Mahima Kopparam

Amanda Sabbouh

Gabriela Guiu-Sorsa

Amanda Soo

Cyber Security Adviser

Anjali Varghese

Melanie Ninovic Principal Consultant - Digital Forensics & Incident Response (DFIR) Paraflare

Evangeline Endacott Cyber Defence Analytics Researcher Commonwealth Bank of Australia

Christie Wilson Cyber Resilience Manager UniSuper

Nelda Johannesen Senior Security Advisor • Security Operations nbn

Jessica Britz Senior Cyber Analyst, Third Party Governance and Risk TAL Services Limited

Caroline Cui Christie Wilson Cindy Kennedy Deanna Gibbs

Mary Tokic Maryam Shoraka Melanie Ninovic Melissa Cavallo Mina Zaki Montana Oliver

Enid Zeng

Nelda Johannesen

Evangeline Endacott

Rachel Mansson

Ffrances Lawes

Ritu Dahiya

Gabriela GuiuSorsa

Sam Moody

Nichole Franks

Hannah McKelvie Helen Flaherty Jessica Britz

Shivani Prajapati Shyvone Forster Skye Wu

Joannie Lee-Lang

Sriya Jayawardana

Jordan Roberts

Tayla Jones

Kristy Michael

Zoe Hassett

Kylie Johnson

2023

I S S U E 17

Thank you to our sponsors WOMEN IN SECURITY MAGAZINE

117


Best Program for Young Individuals in Security WINNER

Purple Team Australia This collaborative initiative actively involves women and First Nations Australians, offering a comprehensive pathway for holistic cybersecurity education and talent management. It stands as an exceptional contribution towards closing the cybersecurity gap. By steadfastly emphasising diversity and education, it is driving substantial changes and redefining the cybersecurity landscape.

HIGHLY COMMENDED

ASD CyberEXP - LifeJourney in partnership with ASD This innovative program immerses Australian students in the dynamic realm of cybersecurity through engaging online experiences and activities. Its profound impact is indisputable, reflected in the unwavering dedication of LifeJourney and ASD to cultivate the next generation of cybersecurity professionals and spark authentic curiosity about this critical field.

FINALISTS

NOMINEES

ASD CyberEXP

ASD CyberEXP

Code Like a Girl Purple Team Australia

Australian Defence Force Cyber Gap program

Microsoft Traineeship program (MEGT)

Purple Team Australia

Code Like a Girl CommBank X Telstra Girls in Tech Event CyberFit Nation Cybermarvel - online safety education program

118

W O M E N I N S E C U R I T Y M A G A Z I N E

Microsoft Traineeship program (MEGT) HerTechPath Macquarie Group’s Tech Select Program Sekuro Hackcelerator Mentorship Program Trend Micro Certification Program in IT Security

N O V E M B E R • D E C E M B E R 2023


IN THE SPOTLIGHT WITH PURPLE TEAM AUSTRALIA: WINNER OF THE AWARD FOR BEST PROGRAM FOR YOUNG INDIVIDUALS IN SECURITY In the ever-evolving landscapes of security and cybersecurity, the recognition of outstanding programs geared towards nurturing young talent is of paramount importance. Today, we have the privilege of delving into the remarkable journey of Purple Team Australia, winner of the Best Program for Young Individuals in Security award.

A PROGRAM WITH A PURPOSE The Purple Team Australia program is a purposedriven initiative aimed at empowering young individuals, particularly women and First Nations Australians, to take the helm in the cybersecurity workforce. At its core the program's mission is to bridge the skills gap and remedy the personnel shortage facing the cybersecurity industry. The unique approach taken by Purple Team Australia involves providing a holistic support system for its students, known as Purple Teamers. Through multiple touch points participants are guided, encouraged and prepared for the challenges of the cybersecurity world. These touch points

I S S U E 17

WOMEN IN SECURITY MAGAZINE

119


include webinars hosted by program staff and

ensuring they are placed into roles that suit

featuring presentations from industry experts and

them best.

instructors. Additionally, Purple Teamers benefit from access to dedicated volunteer mentors offering

The program provides a well-rounded education

invaluable guidance.

encompassing theoretical concepts and practical applications of cybersecurity. It covers topics such

A talent manager plays a pivotal role in helping Purple

as IT Essentials, Blue Team, Red Team, and Purple

Teamers find job roles that align with their aptitudes

Team. The practical aspects provide Purple Teamers

and interests. At the culmination of their journey

with hands-on experience, ensuring they are well-

participants receive micro-credentials and various

prepared for the challenges of the industry.

subscriptions, reinforcing their skills and knowledge. Mentorship plays a crucial role in the program's

THE INSPIRATION BEHIND THE PROGRAM

success. Passionate mentors have devoted their

The genesis of Purple Team Australia can be traced

time to guide students, providing them with unique

back to a pressing need for diversity in cybersecurity.

opportunities to learn from industry professionals

The program's founders recognised that the

across various disciplines in cybersecurity.

cybersecurity industry faced a critical skills shortage and nurture talent from various backgrounds,

CRITICAL SKILLS AND KNOWLEDGE FOR SUCCESS

including women and First Nations Australians.

In the cybersecurity and security industries attitudinal

and were inspired to create a platform to welcome

attributes like a strong problem-solving mindset and They believe diversity to be the key to introducing

critical thinking skills are highly regarded. While the

a fresh perspective and balancing the industry's

program equips students with knowledge about kill

workforce. By embracing a diverse range

chains and threat hunting, it also places significant

of talents the program aims to leverage the

emphasis on cultivating the right attitude.

unique perspectives and skills offered by these underrepresented groups.

Effective communication is another essential skill. Purple Teamers are encouraged to use a

STORIES OF SUCCESS

collaboration platform to foster collaboration, discuss

The impact of the Purple Team Australia program

challenges, support one another and build a spirit of

can be best described through the success stories

community and collaboration.

and testimonials of the young individuals it has their experiences and achievements via LinkedIn

FOSTERING COLLABORATION AND MENTORSHIP

articles, highlighting how the program has positively

Collaboration and mentorship are central

influenced their careers in the security sector.

components of the Purple Team Australia program.

nurtured. These Purple Teamers have shared

The initiative promotes collaboration by hosting

INNOVATIVE APPROACHES FOR ENGAGING YOUNG TALENTS

regular expert-in-residence sessions. These sessions

Creating a successful program for young individuals

professionals across the cybersecurity spectrum.

enable students to interact with and learn from

in security requires innovation and dedication. Purple

120

Team Australia has crafted a unique recruitment

The mentoring aspect of the program is equally

process that evaluates candidates' cyber-specific

vital. Dedicated mentors conduct regular mentoring

aptitudes through a test and an interview with the

sessions, addressing topics selected by the students.

talent manager. This process helps identify students'

These interactions create a sense of community and

skill levels and their passion for cybersecurity,

collaboration crucial in the cybersecurity realm.

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


OVERCOMING CHALLENGES FOR CONTINUED SUCCESS

champion the cause of women and First Nations

As with any program, the Purple Team Australia

the program, ensure it caters to their unique

initiative has faced its fair share of challenges,

requirements and delivers benefits to them.

Australians has enabled these groups to access

especially in its pilot phase. Constructive feedback from students and mentors has proven invaluable,

A BRIGHT FUTURE

enabling the program to adapt and evolve. This

Winning the award for Best Program for Young

continuous feedback ensures the ongoing success

Individuals in Security is a remarkable achievement

and improvement of the program in subsequent

for Purple Team Australia. The program's founders,

iterations.

partners, sponsors, mentors and students all share in this honour.

MEASURING IMPACT AND SUCCESS The true measure of success for Purple Team

As it looks to the future, Purple Team Australia

Australia lies in the feedback provided by students.

hopes this award will shed light on the significance

They report that the program has boosted their

of equality and inclusivity in cybersecurity. By

confidence and skills, which reinforces its sense of

demystifying the industry and instilling confidence in

purpose and confirms its contribution to nurturing

individuals from all walks of life the program aspires

the next generation of security professionals.

to inspire a diverse range of talents to join the cybersecurity realm. After all, in cybersecurity, there

DIVERSITY AND INCLUSIVITY

is a role for everyone. Everyone needs to discover

Diversity and inclusivity are at the heart of Purple

where their skills and passion can make a difference.

Team Australia. Collaboration with experts who

I S S U E 17

WOMEN IN SECURITY MAGAZINE

121


Best Industry Initiative that Supports Diversity, Inclusion and Equality WINNER

Purple Team Australia Cybermerc The Purple Team Australia Program’s outstanding commitment to coownership, real-world skills, inclusivity, partnerships, and feedback-driven improvement has revolutionised workforce development. Its unwavering dedication to tackling cybersecurity challenges and promoting diversity, inclusion, and excellence sets it apart.

HIGHLY COMMENDED

nbn Security Group Diverse Talent Program by nbnCo This program breaks norms, reaching beyond typical internships for innovation, inclusivity, and industry impact. It underscores nbn’s commitment to a diverse and thriving environment. With opportunities spanning the entire Security Group, it drives meaningful projects for Australia’s digital future.

FINALISTS

nbn Security Group Diverse Talent Program

ANZ Spectrum Program

by nbn Co

Aya Leadership Programs

Women in Security Mentoring Network by AWSN, ASD & OK RDY

Purple Team Australia Cybermerc

Aya Leadership: Women in Security Leadership Development by Dr. Susan McGinty

CyberCX Academy: All-Women Cohort CyberCX

122

NOMINEES

W O M E N I N S E C U R I T Y M A G A Z I N E

nbn Security Group Diverse Talent Program Purple Team Australia

Cyber Insights Series: Women in Cyber

Security's Got Talent Initiative, Accenture

CyberCX Academy: All-Women Cohort Cynapse

Telstras Cloud Security Secondment Program

Deloitte Cyber Academy

Women in Security Mentoring Network by AWSN, ASD & OK RDY

ISACA OneInTech

N O V E M B E R • D E C E M B E R 2023


MONASH UNIVERSITY Monash University, a sponsor and supporter of the 2023 Australian Women in Security Awards, was also nominated for the Best Place to Work in Security Award. This of course came as no surprise to the people who work there. Monash’s nomination for the award outlined the programs they have to support their inclusivity goals, and we explore these with the stories of three of their team. Monash University, a sponsor and supporter of the

was a strong fit for her role as manager of cyber

2023 Australian Women in Security Awards, was also

awareness and outreach.

nominated for the Best Place to Work in Security Award. This of course came as no surprise to the

The team’s responsibilities extend well beyond

people who work there. Monash’s nomination for the

the role of keeping Monash University information

award outlined the programs they have to support

and assets safe. It has research engagement

their inclusivity goals, and we explore these with the

as well as membership in the Defence Industry

stories of three of their team.

Security Program, a certified ISO27001 environment and FIRST (Forum of Incident Response and

The Monash cyber team, on which its nomination

Security Teams).

will be assessed, comprises 48 staff and while it has not yet achieved gender parity, with 18 women (37.5

In its nomination the university says it takes

percent) it has double the national average. In the

‘a strategic multifaceted approach supporting

2021 census only 17 percent of people giving their

women and non-binary staff to thrive’ with targeted

profession as cyber security were women.

initiatives, tailored development opportunities and by eliminating systemic barriers to hiring and career

Senior security systems engineer, Thiri Htay, joined

advancement through policy changes. These include:

the team as a qualified security analyst in 2018 and was only the second woman in a team of nine.

THE WITH YOU WITH ME RECRUITMENT PROGRAM

Nathira Rajagopal, is a cyber threat intelligence and

Monash wanted to fill digital skills gaps with diverse

vulnerability management analyst in the cyber team

candidates from underrepresented communities.

but started her career at Monash IT service desk. It saw this as an opportunity to strengthen both Fiona Collie joined the cyber team this year with no

its team and the broader IT workforce with a

cyber skills, but her behaviour change background

more cohesive culture of unique skills, ideas and

I S S U E 17

WOMEN IN SECURITY MAGAZINE

123


From left to right: Nathira Rajagopal, Fiona Collie and Thiri Htay

viewpoints, while also offering opportunities to

community of students, staff and alumni who are

those who had been hindered by traditional barriers

deeply engaged with the wider community and

to employment.

supporting the dissemination of university knowledge and practice.”

SENIOR WOMEN’S SHADOWING PROGRAM This program supports the career progression of

Htay says her experience reflects this, “I was

women into senior executive by enabling them to

concerned about any culture and technology

shadow senior executives for six months.

gap,” she says. “However, the people, culture and Monash cyber team not only recognised my skills,

PRIDE IN ACTION LEADERSHIP PROGRAM

knowledge and experiences but also provided me

Monash became a gold sponsor of the Victorian

with opportunities to grow my career by supporting

Pride Centre’s ‘Pride in Action’ leadership program

me with engaging projects, training and opportunities

which also allows four of its LGBTIQA+ staff to

to achieve certifications.”

participate. Rajagopal agrees “Being an international student,

124

The university defines its inclusivity goals in its

it wasn’t easy to land my first job,” she says. “My

strategic plan. Monash commits to “seeking talented

interest in the area of cyber led me to look for

students and staff, irrespective of gender, sexuality,

opportunities. The Monash Cyber team provided

race, ethnicity, disability, cultural, social or economic

those to me. They gave me an opportunity to learn

circumstances and any other protected personal

and grow while contributing to cyberoperations on a

characteristic, and building a diverse and connected

daily basis.”

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Monash has a gender equality plan “to address

encouraged to recognise the whole person to gain a

gender inequities for all staff, eliminate the systemic

comprehensive picture of an application’s potential

barriers to professional development, career

in the role, the full breadth of their experience, their

advancement, and to achieve gender and salary

professional track record and their full range of skills

parity in senior roles, as well as towards a deep and

and abilities.

broad inclusiveness all across the University.” Collie is one staff member thankful for this approach. Since 2017 Monash has had a ‘Respect at Monash’

She says Monash took a chance hiring her. “Although

committee, charged with overseeing its commitment

I had a strong communications and behaviour

to the prevention of sexual harassment, sexual

change background, I had low cyber knowledge

assault and gender-based violence. The committee

and zero cyber experience. They have invested in

has a reporting line to the vice chancellor through the

upskilling my cyber knowledge both with a SANS

university’s equity, diversity and inclusion committee

course and through knowledge transfer, when I ask

and the vice-chancellor’s executive group.

a gazillion questions of my colleagues. I was new in the role a month, when my manager enrolled me in

To further its commitment to gender equality, in

the SANS course. I’ve never had an employer invest

2015 Monash signed up to the Athena Swan Charter,

that much in my professional development before.”

a worldwide framework to support and transform gender equality within higher education and research.

WORKING CULTURE Collie’s favourite thing about working at Monash

FOCUS ON CONTINUAL LEARNING

is the collaboration - internally and externally. “I

The Monash cyber team has a focus on learning

haven’t experienced it at this scale in any other

to keep up with current trends and for employee

organisation. Maybe it is a university thing? For

development.

example, I share observations, challenges and work with cyber awareness colleagues in other Australian

Since starting at Monash Htay has gained two SANS

universities. It is like being 20 percent more efficient

certifications (GCED and GPCS) and an AWS Certified

than working in isolation.”

Security Speciality certification. “Monash has given me opportunities to take care of cyber capabilities in

Rajagopal loves the work culture. “We have a diverse

cloud, applications and network security as a senior

team with open communication and they are very

security systems engineer,” she says. “All cyber team

supportive. I felt very welcomed when I first joined

members are registered or affiliated with cyber

the team, and it is still the same. Above all, we have a

related organisations such as AISA, AusCERT and the

great leadership team who are transparent with their

ACSC. These partnerships allow the team to engage

staff and make sure employees are well treated. They

with people from different sectors, sharing and

also make sure to recognise individual performances

learning what challenges our sector has.”

as well as to guide them through difficult phases.”

DEDICATION TO UNBIASED RECRUITMENT

Htay agrees, “The Monash cyber team treat each

Hiring managers are supported by a resource

other as a family. The culture is based on kindness,

that demonstrates how to conduct unbiased

knowledge sharing and encouragement - and we

selection and inclusive interviewing. They are also

have the best leadership team.”

I S S U E 17

WOMEN IN SECURITY MAGAZINE

125


Champion of Change WINNER

Matt Tett Managing Director, Enex Testlab Matt's dedication to championing change, fueled by a profound belief in equality and the value of diverse perspectives in cybersecurity, is readily apparent. His proactive efforts to address gender underrepresentation and drive systemic change are truly commendable. Matt's personal encounters with gender bias and discrimination have only intensified his commitment to inclusivity. His unwavering passion for empowering women in his role as a Champion of Change serves as a truly inspiring example in the industry.

Masseh Haidary HIGHLY COMMENDED

CEO, Global Payments Masseh is recognised for their remarkable contributions to gender equality in cybersecurity, exemplified by initiatives such as women in leadership programs and collaborations with universities for STEMfocused graduate programs. Their unwavering dedication to providing high school work experiences has not only inspired but also created opportunities for young females, fostering a culture of respect and female leadership. Masseh's transformative mentorship has guided numerous women into senior leadership roles, standing as a testament to their commitment and impact in the field.

FINALISTS

John O'Driscoll Justice Sector CISO, Victoria State Government Department of Justice and Community Safety

Dan Goldberg CEO, Cybza

Matt Tett

Amandeep Bambhra

Ed Messina

Matt Tett

Amreet Prasad

Greg Janky Greg Sawyer

Nishan Rajapaksa

Anthony Moore Brad McGrath

Ian Yip

Chris McDonald

James Nunn‑Price

Managing Director, Enex Testlab

Craig Ford

Jay Hira

Dan Goldberg

John O'Driscoll

Jay Hira

Darcy Nicolle

Layne Hesse

Founder and Executive Director MakeCyberSimple

David Owen

Masseh Haidary

Dr. Venkat Balakrishnan

Mat Franklin

Masseh Haidary CEO, Global Payments

126

NOMINEES

W O M E N I N S E C U R I T Y M A G A Z I N E

Noel Allnutt Piya Shedden Prashant Haldankar Sean Hugo Simon Gribble Tony Garner Troy Vanderplas

N O V E M B E R • D E C E M B E R 2023


IN THE SPOTLIGHT WITH MATT TETT: WINNER OF THE CHAMPION OF CHANGE AWARD PAVING THE WAY FOR GENDER EQUALITY IN CYBERSECURITY The world of cybersecurity is ever-evolving, with ground-breaking advancements and challenges emerging at a breathtaking pace. However, one aspect that requires equal acceleration is gender equality. As a champion of change and the managing director of Enex TestLab, Matt Tett has been actively engaged in promoting and nurturing gender equality in the cybersecurity industry. In this article we explore his motivations, experiences and the transformational journey he has embarked on.

THE DRIVE TO BECOME A CHAMPION OF CHANGE Matt Tett's decision to become a champion of change was catalysed by the stories and experiences of his peers in cybersecurity. These narratives unveiled a disheartening reality of gender bias and discrimination, especially in professional settings and industry events. Many talented individuals, particularly women, were made to feel unwelcome and marginalised. Matt recognised the dire need for the industry to unite and create a safe, welcoming and inclusive environment for all its members.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

127


ILLUMINATING REALITIES THROUGH PERSONAL EXPERIENCES

Male leaders in cybersecurity can be the driving

THE ROLE OF MALE LEADERS

The importance of addressing gender-based

force behind change. They can serve as exemplars

discrimination and bias in the workplace became

of recognition and reward based on merit. Creating

apparent to Matt through a multitude of others

an inclusive culture is paramount in the industry.

relating their personal experiences. While he refrains

Organisations that actively foster inclusivity quickly

from singling out specific instances he acknowledges

gain positive reputations, and their commitment to

that such experiences are, regrettably, recurring. This

an equitable culture becomes widely acknowledged.

repetition serves as a stark reminder that much work remains to be done, and that the journey towards

FAIR HIRING AND PROMOTION PRACTICES

genuine equity within the industry continues.

Matt reiterates that his organisation follows a merit-based approach as mentioned earlier. It looks

GENDER DIVERSITY: ENRICHING THE CYBERSECURITY LANDSCAPE

beyond gender to consider a candidate's merits, skills, background and experience.

Gender diversity offers a wealth of advantages to any industry, and particularly to cybersecurity. The

MENTORSHIP AND SPONSORSHIP

benefits span various aspects, from the diversity of

In Matt’s small to medium-sized organisation,

life and career experiences to a broader spectrum

specific mentorship programs may not be present,

of thought and perspective. Given that gender

but cybersecurity training is accessible to all staff

balance is inherent in the population, industries with

members, regardless of gender. This enables

disproportionate gender representation stand to gain

interested individuals to pursue their interests

from a more balanced opinion and the elimination of

further, and the company sometimes financially

ingrained biases.

supports employees' participation in cybersecurity courses.

CONCRETE ACTIONS TO PROMOTE GENDER EQUALITY

SUPPORTING FEMALE EMPLOYEES

In Matt's organisation the principles of gender

Ensuring the voices of female employees are heard

equality and diversity are firmly ingrained. The

and their perspectives valued requires gender

company follows a merit-based policy during hiring

balance in the management team. An organisational

and promotion processes. Emphasis is placed

culture built on support is fundamental. Regular

on skills, education, background and experience

meetings with all staff members provide an

rather than gender. Management is committed to

opportunity for feedback and input, ultimately

maintaining gender balance, right from the top.

influencing decision-making.

Continuous education and training are central to this approach, and work-life flexibility is prioritised,

ADVICE TO MALE LEADERS

because it is often of more importance to employees

For male leaders seeking to champion gender

than financial rewards.

equality and diversity, Matt's advice is simple: fear not, step out of your comfort zones, educate

OVERCOMING CHALLENGES

yourselves and become allies. Everyone makes

Being a business owner allows Matt to circumvent

mistakes, but learning from these mistakes is

many of the challenges that may be encountered in

crucial. The rewards far outweigh any reservations.

promoting gender equality. The primary challenge is

Providing support to those who need it the most is a

the lack of gender diversity in applicants responding

profoundly rewarding endeavour.

to job openings. In such cases, Matt proactively seeks to increase diversity where possible.

128

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


MEASURING IMPACT

RESOURCES AND BEST PRACTICES

The metrics for measuring the impact of efforts to

Matt believes the most valuable resource to be

increase gender diversity and reduce discrimination

the individuals who have generously shared their

are complex, making the outcomes of such efforts

experiences and insights with him. Learning from

difficult to quantify. Matt's approach is to support

those who have faced adversity within the industry is

those in need and focus on the collective effort.

invaluable. His advice to future champions of change

Achieving equity will eventually result in a balanced

is to seek out mentors and peers and learn from

industry where discrimination has no place.

their journeys.

POSITIVE OUTCOMES

LONG-TERM GOALS

Matt's dedication to gender equality has contributed

In the long run, Matt envisions a future where his role

to an encouraging trend in the industry. Many

as a champion of change is no longer necessary,

organisations across different sectors are

because true equity will have become the industry

implementing diversity, equity and inclusion policies,

standard. This transformation requires collective

signifying a collective move in the right direction.

effort, and Matt encourages others to join this ongoing journey.

HANDLING RESISTANCE When faced with scepticism or resistance, Matt takes a proactive approach. He identifies the underlying causes, which are often rooted in perceived threats or peer pressure. He aims to address these concerns by showcasing the impact of bias on individuals, organisations and the industry. Encouraging individuals to empathise with others' perspectives and fostering understanding can be transformative.

I S S U E 17

"Change may be gradual, but it is undeniably attainable. The ultimate goal is balance and a discrimination-free industry, and there is no time like the present to embark on this mission".

WOMEN IN SECURITY MAGAZINE

129



Converged Security Resilience Champion SPONSORED BY Chelsea Capizzi-Walsh Executive Manager Crisis Management, Commonwealth Bank of Australia

WINNER

Chelsea is recognised for her leadership in the Commonwealth Bank's UTAS partnership, where she has played a pivotal role in enhancing crisis capability through innovative scenario planning. Her work is not only impactful but also inspiring to future security leaders. Chelsea's dedication to empowering young women in technology is particularly commendable, as she actively encourages and supports them in their career journeys. Furthermore, her active engagement in various industry groups and networks has been instrumental in advancing the integration of cyber and physical security measures, as well as the development of industry-level exercises. Chelsea's valuable insights and best practices contribute significantly to the continued growth and improvement of the security industry.

Jacinta Thomson Director (SES1) Police Enquiry and Data Sharing department, Victoria Police

WINNER

Jacinta's leadership is the driving force behind real transformative change, strengthening cyber governance and security. Her visionary approach leaves a lasting impact on information security and community safety, making her a true pioneer in the field. Jacinta's exceptional interpersonal skills are instrumental in fostering collaboration, trust, and secure information sharing partnerships. Her extensive protective security experience instills confidence among stakeholders, rendering her an exemplary figure in the realm of cybersecurity and governance.

FINALISTS

NOMINEES

Jacinta Thomson

Roseline Christopher

Chelsea Capizzi-Walsh

Director (SES1) Police Enquiry and Data Sharing department Victoria Police

Consultant Sekuro

Frances Bouzo

Chelsea Capizzi-Walsh Executive Manager Crisis Management Commonwealth Bank of Australia

I S S U E 17

Sammie Yuan Security & Risk Associate SecRisk

Jacinta Thomson Meg Tapia Roseline Christopher Sammie Yuan Supun Lokuliyana

WOMEN IN SECURITY MAGAZINE

131


IN THE SPOTLIGHT WITH JACINTA THOMSON: WINNER OF THE CONVERGED SECURITY RESILIENCE CHAMPION AWARD The Converged Security Resilience Champion award

fortunate to take on successive leadership roles with

goes to the individual judged to have best mastered

a protection of community focus and an evolving and

the art of balancing the convergence of digital and

increasing aspect around converged security and

physical security, to have proven their ability to

building resilience,” she says.

identify and address the challenges that arise when dealing with both cyber and physical security and

Jacinta has a demonstrated track record in leading

to have united the management of physical and

complex, high-risk, high-profile programs from

cybersecurity within their organisation, and the

design to implementation. With a background in

teams responsible for each aspect.

law enforcement, protective security and industry relations she has built and led high performing teams

The 2023 Converged Security Resilience Champion is

to deliver and promote convergence between cyber

Jacinta Thomson, Director of the Police Enquiry and

and physical security outcomes at a state, national

Data Sharing Department (PEDSD) of Victoria Police

and international level.

where she leads a team of 150 staff operating 24/7.

132

Her department securely shares law enforcement

Her inspiration to join the police force came from

information and data in real time to enable police

a life-threatening experience: as an 18 year-old she

officers, protective services officers and state and

was abducted by a taxi driver. “The injuries suffered

national governments to operationalise legislation,

saving my life saw a long recovery and fired a desire

inform decision making processes and manage risk

for a Victoria Police career motivated by the example

to protect life and property, deliver community safety

of caring detectives who helped in my hour of need,”

and help those in need of assistance.

she says.

Her current role is the latest in an almost 30 year

PROVIDING SERVICES TO VICTORIA

career in converged security. “Since graduating

Key services her department provides include

from Victoria Police Academy in 1994 I have been

recording and monitoring crime, offender records

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


and non-crime information, bail, warrants, court

A CONSENSUS BUILDER

results management and continuous data quality

This involved management of all protective

checking services.

security domains and security/cyber incident response. To establish this framework Jacinta

Jacinta’s current role is her fourth stint with

had to build consensus on the operational details

Victoria Police. In a previous role as acting

and implementation of the strategy across the

executive director of investment management and

department and many statutory agencies within

reporting, she led the development of a multiyear

the justice portfolio. This meant moving away

investment framework and strategy to reposition the

from the entrenched and traditional IT led security

organisation’s planning of investment management.

arrangements and thinking to deliver a culture that

The strategy has strengthened leadership

embraced security as ‘everyone’s business’.

governance, risk management and decision-making processes regarding prioritisation of IT infrastructure,

Alongside this work she also led the DJCS Emergency

security/cyber and data capabilities and investment.

Management Framework to uplift internal crisis management, notifiable incidents management,

At a federal level, as a director in the Department of

business continuity and emergency management

Defence, Jacinta led a national program and team to

preparedness, response and recovery activities.

deliver the Defence Industry Security Program (DISP), focused on minimising security risks and raising

Both frameworks repositioned justice strategic and

levels of security protection across the security

operational capability and increased trust between

categories of governance, personnel security,

agencies, and the Office of the Victorian Information

physical security, information and cybersecurity.

Commissioner. They resulted in Jacinta being nominated for and receiving the 2019 IPAA(Vic)

In another role as director of security management

Top 50 Public Sector Women Award – Established

and assurance in the Victorian Department of Justice

Leader category.

and Community Safety (DJCS), Jacinta worked closely with the Department of Premier and Cabinet’s

She also led the strategic transformation of DJCS

cybersecurity unit to build a justice incident response

from a siloed model of more than 50 entities largely

capability, and led the delivery of a DJCS security

focused on traditional IT approaches to a modern

management framework and strategy to implement

security management framework that empowers

the Privacy and Data Protection Act 2014 and the

and enables people to meet responsibilities through

Victoria Protective Data Security Standards.

trusted, innovative and risk-based solutions.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

133


The One to Watch in Protective Security WINNER

Nadia Hammoud Manager, Security & Emergency Response Centre (SERC), nbn Nadia's 19-year journey in critical security roles is a testament to her excellence and resilience. Her remarkable capacity for innovation, even in the face of bias and discrimination, highlights her untapped potential. Nadia's ability to draw lessons from Brazilian Jujitsu to navigate challenges and foster personal growth is truly commendable. Her inspirational story leaves us eagerly anticipating the next chapter of her journey.

SPECIAL RECOGNITION

Michelle Lee Identity and Access Analyst, TAL Services Limited Michelle's dedication and unwavering drive have paved the way for remarkable achievements, notably in her role at TAL. Her contributions transcend her immediate work environment, as evidenced by her active involvement in the CySec Leaders Summit and her prominent role in Privileged Access Management, where she has earned recognition as a subject matter expert. Michelle's exceptional leadership qualities are evident, and her commitment to peer support and social learning is palpable through her role as a co-founder of UTS BITCOM.

FINALISTS

Danielle Mitchell Training Manager APAC/IMEA Gallagher Security

Nadia Hammoud Manager, Security & Emergency Response Centre (SERC) nbn

Aimee Rick Assistant Agency Security Advisor Attorney General's Department

134

Vanessa Kong

NOMINEES

Lara Baillie

Senior Security Engineer Mantel Group

Alyssia Balic

Lara Baillie

Caitlin Galpin

Security Governance Officer Sydney Metro

Caitlin Sauza

Michelle Lee Identity and Access Analyst TAL Services Limited

W O M E N I N S E C U R I T Y M A G A Z I N E

Aimee Rick

Caroline Ng Claudia Chevelle Squire Danielle Mitchell Emma Uddin Fadzayi Chiwandire

Lucy Stevenson

Nievedha Karthikeyan

Madeleine Stewart-Teh

Nikita Gossain

Marina Azar Toailoa

Parneet Mehar

Marnie McLeod

Rebecca Kitt

Melanie Hanson

Niran Garcha Rati Mehrotra Rimple Kapil

Michelle Lee

Sandhya Gawali

Mina Zaki

Vanessa Kong

Nadia Hammoud

Joanne Denaro

N O V E M B E R • D E C E M B E R 2023


Source2Create Spotlight

Podcasts

We can GENERATE LEADS from your PODCAST

We can SCRIPT & CREATE your PODCAST

We can ADVERTISE & SOCIALISE your PODCAST

5 SERIE S PODCA ST AUD$10 ,000 Ex GST

REACH OUT TODAY

charlie@source2create.com.au

aby@source2create.com.au


Our Services Incident Support Phishing Take-Down Security Bulletins

Australia’s Pioneer Cyber Emergency Response Team

Security Incident Notifications Sensitive Information Alert

Proudly providing cyber security services & expertise for 30 years strong.

Early Warning SMS

AusCERT provides member organisations with proactive and reactive advice and solutions to current threats and vulnerabilities. We help members prevent, detect, respond and mitigate cyber-based attacks.

Malicious URL Feed

CONTACT US TO JOIN

As a not-for-profit security group based at The University of Queensland Australia, AusCERT delivers 24/7 service to members alongside a range of comprehensive tools to strengthen your cyber security strategy.

+61 7 3365 4417 membership@auscert.org.au

www.auscert.org.au 24/7 support against cyber security threats Safe & secure all information shared is secure & encrypted

eNHANCE YOUR KNOWLEDGE WITH OUR EXCEPTIONAL Training Courses Regular events meetups, workshops & more

Access to all Threat Intel Services and a nationally trusted team

Conference discounts and free tickets to the Annual Cyber Security Conference Not-for-profit

Our training courses are designed and delivered by highly experienced existing for the greater good of our members AusCERT staff or industry trainers. We only use practitioners with relevant industry experience to ensure an authentic, real-world experience for training participants, delivered in an engaging and interactive way.

Explore our Diverse Range of Training Courses

Introduction to Cyber Security for IT Professionals

Intermediate Cyber Security for IT Professionals

Data Governance principles & Practices

Register Now

Cyber Security risk management

Cyber Security Fundamentals

Cyber Security for Risk Practitioners

Incident RESPONSE Planning

auscert.org.au/services/auscert-education/


Best Security Student SPONSORED BY Eleni Lykopandis

WINNER

Information Security Officer, Australian Bureau of Statistics Eleni stands out for her exceptional capacity to inspire others and her steadfast dedication to the Australian ICT industry. She has showcased remarkable leadership potential by proactively pursuing opportunities for skill enhancement and networking in both the public and private sectors. Eleni's unwavering commitment to ongoing learning, coupled with her role as a Student Advisor for cybersecurity degrees at La Trobe University, where she enhances cybersecurity-related programs, makes her a distinguished recipient.

HIGHLY COMMENDED

Bethany Balazs Technology Graduate, Commonwealth Bank Bethany's first graduate rotation was marked by her leadership in a crucial Jira migration project. She has played a pivotal role on the Graduate Committee, actively contributing to the establishment of a national graduate community. Bethany's dedication to cybersecurity education is evident in her engaging workshops and outreach efforts. As a member of the Cyber Champions program, she serves as an inspiration to her peers through her mentoring and unwavering commitment to the field.

FINALISTS

Ailie Houlihan Associate Consultant - Cyber Strategy & Consulting CyberCX

Bethany Balazs Technology Graduate Commonwealth Bank

Eleni Lykopandis Information Security Officer Australian Bureau of Statistics

I S S U E 17

Elizabeth Aidi Kamau Students Ambassador Edith Cowan University

Giuliana De Bellis Security Engineer Atlassian

Felicity Le Locations Officer Risk & Security Management

NOMINEES Ailie Houlihan Bethany Balazs Dion Kouskouris Elena Yakovleva Eleni Lykopandis Elizabeth Aidi Kamau Emily Borgo Emily Ogilive Felicity Le Georgia-Marie Elias Giuliana De Bellis Greeshma Dantla Imogen Turner Katie Perry Kelly Howell

Kirsten Moylan Kirti Sikarwar Lifang Wei Maria Harris Miel Balestrat Miranda Raffaele Paige Baker Rameen Nadeem Ruchita Pandey Solange Fecci Susan Wu Swarali Sarangdhar Valerina Ong Victoria Birch

WOMEN IN SECURITY MAGAZINE

137


Most Innovative Educator in Cybersecurity WINNER The Girls Programming Network (GPN) is celebrated for its grassroots initiative, which passionately champions gender diversity in the tech industry. GPN's dedication extends to nurturing a supportive community, empowering its volunteers, and effectively cultivating a pipeline for tech careers.

Tech Inclusion’s Girls’ Programming Network Tech Inclusion

FINALISTS

NOMINEES

Tech Inclusion's Girls' Programming Network

Tech Inclusion's Girls' Programming Network

Tech Inclusion

Sophia Kakavoules

Cybermarvel - online safety education program

Melissa Larkins

Cyber Security Awareness and Education Manager NSW Department of Education

Ivana Kvesic, Dominika Zerbe – Anders and Kelsy Zalfields

Schools Cyber Security Challenges

Angie Russell

Grok Academy

Serena Pillay

Serena Pillay

Suzanne Murray Dyke

Senior Manager Learning Experience and Design Phriendly Phishing

Sophia Kakavoules Cyber Culture and Engagement Lead Department of Government Services

138

The transformative impact of GPN is evident in its ability to generate greater interest in tech, bolster diversity, and overcome scaling challenges through its unified nodes, ensuring the preservation of national value. The network's true impact shines through the high demand for its programs, rapid workshop enrollments, and surging participation rates. Notably, newcomers' perceptions are changed, and existing students are more inclined to pursue IT careers, underscoring the enduring worth and remarkable success of the program.

W O M E N I N S E C U R I T Y M A G A Z I N E

Cybermarvel - online safety education program Schools Cyber Security Challenges

N O V E M B E R • D E C E M B E R 2023


Need a professional marketing, strategy and implementation agency that is dedicated, responsive, professional, dedicated, creative, innovative, hardworking, and really cares about your business outcomes?

Then let us help YOU. REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.

With:

aby@source2create.com.au charlie@source2create.com.au source2create.com.au


IN THE SPOTLIGHT WITH GIRLS PROGRAMMING NETWORK: WINNER OF THE MOST INNOVATIVE EDUCATOR IN CYBERSECURITY AWARD The Girls Programming Network (GPN) is a deserving winner of this year’s Most Innovative Educator in Cybersecurity award. It has been teaching all kinds of programming and technology skills to women and girls in fun and friendly ways for 15 years reaching thousands of girls around the country, well before awareness of cybersecurity skills and their importance became widespread. Its cryptography workshops have long been popular with students and volunteers. GPN takes a broad approach to cyber education, combining practical training to give students a broad understanding of key security concepts with conversations in its workshops that give its team of knowledgeable volunteers the opportunity to explain the importance of emerging cyber principles in an accessible way. This empowers students to engage with new concepts when they encounter them outside the workshops.

140

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


As the profile of cybersecurity has grown over the last few years students have wanted to learn more, to keep themselves safe online and to get them started on the technical skills they can take in cybersecurity careers that will help them protect others. To satisfy this demand, GPN has worked to create new content packages such as its ‘Security Chatbot’ project in which students code increasingly difficult security tests to protect secret information, and ‘Password Cracker’ where students learn about the importance of strong passwords and, by playing the role of the hacker, explore the world of password hashes and rainbow tables.

A UNIQUE APPROACH One aspect of GPN’s approach that sets it apart

GPN makes a deliberate effort to break down

from many others is that it teaches both sides of

the stereotypes and barriers that prevent gender

cybersecurity together: it teaches individuals how to

minorities from giving tech a go, especially in the

protect themselves online and helps them prepare

male-dominated area of cybersecurity. These efforts

for careers in cybersecurity. This approach gives

are reflected in its volunteer base, a diverse group

students a deeper understanding of cybersecurity

of women and gender-diverse people. They begin

and imbues them with a passion to improve the

the day by sharing a little about themselves that is

cybersecurity landscape for their families, friends

not tech-related to show they like many things from

and the world.

dance to baking to basketball, and still like to code.

Mentorship is an essential part of the GPN program

REMOVING BARRIERS

for both students and volunteers, helping it meet its

GPN goes to great lengths to ensure barriers that

commitment to supporting students and volunteers

could prevent students from signing up or turning up

from their first line of code, throughout university and

are removed. Its events are free, and it provides free

into their careers.

snacks and stationery, as well as all the technology needed for the day. To ensure students can make

Many students who have developed an interest in

it on the day, regardless of whether a parent can

cybersecurity at GPN have gone on to pursue tech

drop them off, GPN runs a ‘walking bus’ from

and cyber studies in university. And many GPN

nearby public transport so students can travel to the

volunteers take a keen interest in cybersecurity

event safely.

after the workshops and have used the leadership skills they pick up at GPN to extend their roles in the

GPN has put considerable effort into broadening its

industry elsewhere.

cybersecurity content over the past few years, doing something novel rather than something its students

Diversity and inclusion are at the heart of the GPN

will have experienced elsewhere. It hopes recognition

program. The organisation strives to create a

as Most Innovative Educator in Cybersecurity will

welcoming environment where women, girls and

increase awareness of its programs and get more

gender-diverse people can share their knowledge,

students to participate, enabling it to highlight the

learn in a supportive environment, have fun and

diverse range of rewarding tech careers available,

make friends.

especially in high demand sectors like cybersecurity.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

141


Equifax Protect Identity and credit protection services. Your response to a data breach is the first step to renewing trust with those impacted. Acting quickly can help repair your brand’s reputation, drive customer loyalty, and ensure customers are protected. Help your customers protect their identity information and reduce the risk of financial loss through credit and identity monitoring:

9 Dark Web Monitoring & Alerts - Be alerted if personal information is found being traded online.

9 Credit Alerts - Real time notifications to important changes on their credit report including if someone applies for credit in their name.

9 Credit Score & Report - Track their credit score and credit report over time.

Equifax has helped organisations with some of the largest consumer data breaches in Australia with Equifax Protect.

For more information visit equifax.com.au/protect


Best Innovative Business 'Reshaping the Future' of the Security Industry SPONSORED BY AustCyber WINNER

AustCyber is applauded for its transformative initiatives that are shaping the future of the security industry. The ACSP Program, which enhances trust in Australian cybersecurity professionals, plays a pivotal role in making the digital environment safer for all. Their AustCyber Innovation Network promotes equal opportunities and fosters a connected community within the industry, furthering collaboration and innovation. Additionally, their partnering Cyber Security Microsoft Traineeship Program directly addresses industry demand for skilled professionals. AustCyber's AUCyberExplorer initiative is instrumental in guiding aspiring professionals along various career pathways in the cybersecurity field. Collectively, these initiatives demonstrate their dedication to advancing and securing the digital landscape while equipping individuals with the skills and knowledge to thrive in the cybersecurity sector.

SecureCode Warrior HIGHLY COMMENDED

Secure Code Warrior is recognised for providing customisable, highimpact secure coding education tailored for developers. Through the effective use of agile learning methods, they successfully upskill and instill software security principles, contributing significantly to the retention of these critical skills. Secure Code Warrior's approach fosters a positive security experience, cultivating a security mindset among developers. Their efforts empower organizations to proactively defend against threats while enhancing code quality. Secure Code Warrior's dedication ensures that companies have a strong partner to train their development teams, serving as the first line of defense in the ongoing battle against cybersecurity threats.

FINALISTS

Cyber Wardens by 89 Degrees East

Cyber Security NSW

NOMINEES InfoSecAssure Pty Ptd Equisec AustCyber

AustCyber

Bugcrowd

SecureCode Warrior

Cyber Security NSW

I S S U E 17

Cyber Wardens

KPMG Australia

Gergana Winzer for KPMG "Cyber in a Box"

Mina Zaki for KPMG's Alliance partnerships

Kelly Henney for KPMG's "Data Protection Navigator"

SecureCode Warrior

WOMEN IN SECURITY MAGAZINE

143


Protective Security Champion WINNER

Rachell DeLuca Director | Protective Security & Risk Specialist, Protective Security Advisory Pty Ltd

FINALISTS

Nadia Hammoud Manager, Security & Emergency Response Centre (SERC) nbnco

Rachell DeLuca Director | Protective Security & Risk Specialist Protective Security Advisory Pty Ltd

Pam Lamotta Specialist, Protective Security Operations and Response IAG

Amy Ruth Hewson

144

Rachell is celebrated for her remarkable impact on Australia's security sector, her profound expertise in risk and protective security, and her unwavering commitment to mentoring and advancing gender diversity within significant projects. Her leadership and passionate advocacy have solidified her position as a prominent figure in the security field, driving positive change for women and serving as an inspirational force for all.

NOMINEES

Amy Ruth Hewson Karen Phillips Kellie Ball Khushboo Gupta Marina Azar Toailoa Nadia Hammoud Pam Lamotta Parul Mittal Rachell DeLuca Richa Sharma

Chief Executive Officer Mitchell Personnel Solutions

Roxanne Pashaei

Roxanne Pashaei

Sarina Persall

Managed Services & Security (Cloud) Senior Lead Telstra

Zynthea Kaur Maan

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


IN THE SPOTLIGHT WITH RACHELL DELUCA: WINNER OF THE PROTECTIVE SECURITY CHAMPION AWARD Rachell DeLuca, named Protective Security Champion in this year’s Australian Women in Security Awards, has worn many hats in her quarter century long career. She was the first female chair of ASIS International Victoria Australia Chapter in 2021. She is a fellow of the Institute of Strategic Risk Management (ISRM), was a founding member of an unofficial Women in Security & Resilience (WiSR) group, a member of the AWSN, and sat on the Victorian Industry Advisory Council (VSIAC) to inform the Victorian Government on matters affecting the security industry. She has also sat on numerous judging panels for a range of awards where she has seen first-hand the excellent work being done by women and nonbinary persons across the industry. Her involvement with these groups has allowed her to contribute to planning events, online webinars and engage with members seeking advice and someone to bounce things off.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

145


BUSINESS OWNER

She says the mentoring she received early in her

Today, she runs her own consultancy, Protective

career has inspired her to get involved with as many

Security Advisory, through which she works with

parts of the industry as possible, be as visible as

clients to identify their security risk exposure,

possible to other women, provide support and show

design their security controls and systems, and

that women can be successful in the industry.

develop strategic objectives to strengthen their security posture.

Rachell has recently completed a master’s degree in terrorism and international security, studying the

In the past Rachell has worked for two of the Big

changing threat profile and finding that disgruntled

Four engineering consultancies where she consulted

white nationalists now present a more realistic threat

for a range of major projects and clients, including

to western organisations than Islamic extremists.

several water infrastructure owners to protect their

This, she argues, presents a significant challenge

critical network assets. This was achieved via a

because the threat actor may already work within

strategic review of their asset network, a prioritised

an organisation as a trusted insider or may have

asset classification process, and mandating

access to a critical asset as a contractor via its

minimum-security standards for a consistent

supply chain. Integrating security practices at every

approach. These projects are examples of the holistic

business level, particularly in employee vetting and

approach and whole-of-business engagement

ongoing monitoring of key personnel is more crucial

strategy Rachell uses to help her clients achieve their

than ever.

desired outcomes.

146

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


PROTECTIVE SECURITY ADVOCATE

challenges as well as what, she says,

She intends to continue working to promote

seemed like an impossible delivery timeline.

protective security as an industry and as a career path for those starting out. As a small business

She was particularly pleased that the control centre

owner Rachell believes she is well-placed to

was designed with the intent that 40 percent of the

make more of a positive difference through work

workforce would be women—a figure previously

experience and mentoring to further support

unheard of in Pakistan. This was achieved shortly

development in the industry.

after the centre opened and it is heavily focussed on being a supportive environment for female

Rachell cites one of her most impactful security

employees with provisions made for transportation

projects as being the Lahore Safe Cities Project,

to and from work and family-friendly hours of work

undertaken when she was working for Arup. The

for women to enable them to undertake this type

project involved the installation of more than 8,000

of employment.

CCTV cameras and supporting infrastructure across the city of Lahore to reduce crime, enhance public

Security technology comes in many forms and

safety, improve police accountability, and mitigate

in today’s buildings is pervasive. When designing

terrorist activities. To deliver the project, Rachell

systems for major facilities, Rachell works with

made 15 trips to Lahore over two years.

many other disciplines—architects, ICT engineers, mechanical, electrical, fire and structural engineers

Her role was to work with local engineering teams

through every stage of the design and construction

from a range of different disciplines—civil, ICT,

process to ensure security systems are correctly

security, AV, etc—throughout the tender process to

and fully implemented. She says she gains great

select an integrator and then to oversee the delivery

satisfaction walking around Melbourne and seeing

of the project to the original specifications, all while

the many buildings and landmark projects she has

navigating language, cultural, political and technical

worked on.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

147


Best Security Mentor WINNER

Asou Aminnezhad Security Cloud Solution Architect, Microsoft

Asou is being recognised for their exceptional mentorship, which seamlessly blends inclusivity, global impact, personalised guidance, and transformative outcomes. Their influence has empowered women and non-binary individuals from diverse backgrounds, resulting in noteworthy success stories in the field of cybersecurity. Asou's extraordinary talent for unlocking potential and driving positive change makes them a truly exceptional mentor.

HIGHLY COMMENDED

Jalpa Bhavsar Senior Consultant, Incident Capability Uplift, NAB

148

W O M E N I N S E C U R I T Y M A G A Z I N E

Jalpa is distinguished for her exceptional mentoring programs that empower women, offering them valuable guidance and support to excel in cybersecurity careers. Her formal mentoring initiatives, insightful cybersecurity podcasts, and engaging industry presentations highlight her as a genuine leader and role model. Jalpa's steadfast commitment to reshaping the global cybersecurity landscape, addressing skills shortages, and driving positive change is genuinely commendable.

N O V E M B E R • D E C E M B E R 2023


SPECIAL RECOGNITION

Sandy Assaf Head of IT Risk & Compliance, Crown Resorts

Sandy's exceptional contributions to the Purple Team Australia programs have exceeded expectations, with her active engagement in addressing Australia's cybersecurity skills gap and promoting diversity within the industry. Sandy's remarkable efforts have played a pivotal role in attracting First Nation Women Australians to the field and advancing the AWSN mentor program. The success achieved by numerous mentees who have transitioned into leadership roles and reached their career aspirations stands as a clear testament to Sandy's unwavering dedication and guidance.

FINALISTS

NOMINEES

Jalpa Bhavsar

Jenana Roper

Alison Blazow

Paula Sillars

Senior Consultant, Incident Capability Uplift NAB

General Manager Digital Solutions, Pacific Schneider Electric

Asou Aminnezhad

Rimple Kapil Roxanne Pashaei

Leonard Ng

Sandy Assaf

Chathura Abeydeera

Director - Cyber - Cloud & Digital Deloitte

Head of IT Risk & Compliance Crown Resorts

Asou Aminnezhad

Dipti Mulgund

Security Cloud Solution Architect Microsoft

Managing Consultant CyberCX

Shannon Gibb Cyber Security NBNco

Deepa Bradley

Samantha Gibbons

Dipti Mulgund

Sandy Assaf

Jalpa Bhavsar

Sanjivan Mahendran

Jenana Roper Kent Luong Leanne Howell Leonard Ng Louise Castro Marie Patane

Sermin Cesur Shannon Gibb Siddiqua Shaheen Tania Hunt Trish Keeley

Mina Zaki

I S S U E 17

WOMEN IN SECURITY MAGAZINE

149


IN THE SPOTLIGHT WITH ASOU AMINNEZHAD: WINNER OF THE BEST SECURITY MENTOR AWARD In the rapidly evolving world of cybersecurity, where digital threats are ever advancing and the need for skilled professionals is on the rise, there is one issue that still needs significant attention: gender diversity. Women continue to be underrepresented in the field, and breaking through the glass ceiling can be a daunting task. But there are individuals who are actively working to change this narrative. One such champion of gender diversity in cybersecurity is Asou Aminnezhad, winner of this year’s Best Security Mentor award. She is a mentor dedicated to guiding and supporting women as they navigate their careers in the security industry.

INSPIRATION AND BEGINNINGS Asou was inspired to become a mentor for women in security when she saw the great underrepresentation of women in this critical industry. This realisation served as the catalyst for her journey into mentorship. She observed a gap in the availability of mentoring and support tailored to the unique challenges women face in cybersecurity and decided to take action. Asou knew that, by sharing her experiences and knowledge, she could help more women enter and excel in this dynamic and demanding field.

150

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


CHANGING LIVES, ONE MENTORSHIP AT A TIME

• Positive affirmation: she encourages mentees

Mentorship is a two-way street, and it can be

capabilities, which helps counteract negative

immensely rewarding for both mentor and mentee.

self-talk.

to recognise their accomplishments and

One of Asou’s most memorable moments as a mentor was witnessing the transformation of a

• Setting achievable goals: she works with her

mentee named Olivia. Olivia came from a non-IT

mentees to set achievable, incremental goals,

background but with Asou’s guidance transitioned

which boosts confidence and provides a sense

into a successful cybersecurity manager. This

of accomplishment.

transition showcased the transformative power of mentorship, highlighting how dedicated mentors

• Mentorship circles: Asou sometimes facilitates

can have a profound impact on a mentee’s career

group discussions where mentees can

in security.

share experiences and support one another, helping them realise they are not alone in

QUALITIES OF A SUCCESSFUL MENTOR

their challenges.

Being an effective mentor in the security industry, particularly for women, requires a unique set of

• Skill development: By focussing on skill

qualities and skills. Asou emphasises that empathy,

development and continuous learning she

patience and active listening are foundational

builds a strong foundation and reduces feelings

qualities for any mentor. Furthermore, adaptability

of inadequacy.

and the ability to provide personalised guidance are crucial, because each mentee’s journey is distinct.

• Feedback and self-reflection: She gives regular

It is essential mentors are well-versed in the unique

feedback and encourages self-reflection to help

challenges women may face in the security industry,

mentees recognise their progress and areas

and mentors must be committed to creating an

for improvement.

inclusive and encouraging environment. • Mentorship beyond limits: Asou emphasises

TAILORING MENTORSHIP TO UNIQUE NEEDS

that limitations are often self-imposed and

One of the key aspects of Asou’s mentoring approach

encourages mentees to push their boundaries

is tailoring her guidance to meet the unique needs

and take calculated risks.

and challenges women in security may encounter. This means acknowledging and addressing issues

These strategies, tailored to individual needs, work

like imposter syndrome and gender bias. By creating

towards boosting confidence and combatting

a safe space for open dialogue and offering guidance

imposter syndrome, empowering women in security

on building confidence, navigating workplace

to excel and thrive.

dynamics and setting realistic goals, Asou ensures her approach aligns with each mentee’s specific

COMMON CAREER DEVELOPMENT GOALS

needs and aspirations.

Women in the security industry often seek guidance on various career development goals, including

BOOSTING CONFIDENCE AND OVERCOMING IMPOSTER SYNDROME

leadership development, technical skill enhancement

Addressing imposter syndrome and self-doubt is

these goals through personalised career roadmaps,

a central part of Asou’s mentorship. She employs

technical training recommendations and strategies

various strategies to help mentees build confidence:

for achieving a healthy work-life integration.

I S S U E 17

and work-life balance. Asou helps them achieve

WOMEN IN SECURITY MAGAZINE

151


This holistic approach fosters well-rounded

BALANCING GUIDANCE AND AUTONOMY

career growth.

Balancing guidance while allowing mentees to make their own decisions and learn from their experiences

CREATING A SAFE AND INCLUSIVE ENVIRONMENT

is a delicate art. Asou provides advice, shares

To create a safe and inclusive environment for

emphasises the importance of learning through trial

mentees to discuss their experiences, challenges and

and error. This approach fosters independence and

aspirations, Asou emphasises active listening and

resilience among mentees.

experiences and offers resources, but she also

empathy. She ensures mentees feel heard, valued Additionally, Asou promotes diversity and inclusion

SEEKING MENTORSHIP AND MAKING THE MOST OF IT

by recognising and celebrating difference and

For women seeking mentors in the security industry,

fostering a sense of belonging among mentees.

Asou encourages them not to hesitate but to reach

and respected while also maintaining confidentiality.

out and express their interest. When it comes

RECOMMENDED RESOURCES AND NETWORKING

to making the most of a mentoring relationship,

Asou recommends several resources and networking

setting clear goals, and actively seeking feedback.

opportunities for women in security to further their

Building a strong rapport with a mentor is key to a

careers and skills. These include: joining LinkedIn

successful partnership.

Asou advises being proactive, asking questions,

groups for women in cybersecurity; connecting with

152

online communities; attending industry conferences,

CHALLENGING MISCONCEPTIONS AND BIAS

webinars and workshops; seeking out mentors and

Misconceptions and biases about women’s abilities

sponsors within their organisations for guidance and

in security still persist. Asou addresses these issues

career advancement.

by showcasing the achievements and capabilities of

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


She emphasises the importance of diversity in

STAYING INFORMED IN AN EVER-EVOLVING FIELD

problem-solving and innovation, helping mentees

In the dynamic world of cybersecurity, mentors need

build confidence to challenge stereotypes and prove

to stay up to date on industry trends and changes in

their abilities through their work.

order to provide relevant guidance to mentees. Asou

women in security, including those of her mentees.

achieves this by continuous learning through industry

THE FUTURE OF MENTORSHIP FOR WOMEN IN SECURITY

conferences, webinars and ongoing education.

Looking ahead, Asou envisions a future where

collaborates with peers to exchange insights,

mentoring for women in security becomes even

ensuring the guidance she provides remains relevant

more accessible and structured. She hopes to see

and aligned with the evolving security landscape.

She also maintains a professional network and

increased collaboration between organisations, educational institutions and mentors to create

Asou’s dedication to mentoring and advocating

mentorship programs that address the specific

for women’s advancement in the security industry

needs of women in security. Additionally, Asou would

serves as an inspiration and a catalyst for change.

like to see more recognition and support for mentors

Her commitment to fostering diversity and inclusion

who are driving diversity and inclusion initiatives in

not only benefits women in cybersecurity but

the industry.

also contributes to building a stronger and more resilient industry.

https://www.trendmicro.com/en_au/business/products/one-platform.html

I S S U E 17

WOMEN IN SECURITY MAGAZINE

153


Best Place to Work in Security WINNER

MF & Associates MF & Associates' steadfast dedication to gender equality is clearly reflected in the substantial representation of women in cybersecurity roles within the company. They are genuine champions of inclusion, actively removing hiring obstacles and setting a commendable example for the industry. MF & Associates' remarkable unpaid super policy and inclusive hiring practices highlight their genuine appreciation for diverse skills and backgrounds, fostering a culture that draws exceptional talent, including former CISOs and award-winning professionals.

HIGHLY COMMENDED

Equifax Australia Equifax's remarkable commitment to cultivating a diverse and inclusive workplace is deserving of commendation. Their proactive measures to eliminate biases and advance equal opportunities have a significant impact on the industry. Equifax's actions set a shining example for other organizations to emulate, demonstrating that their strategies and accomplishments are not just words but an inspiring and insightful blueprint for creating genuinely inclusive and diverse environments.

FINALISTS

Deloitte Equifax Australia ANZ Bank MF & Associates Orro Monash University

NOMINEES

AARNet (Australia's Academic and Research Network) ANZ Bank Cyber Security NSW Cydarm Technologies Deloitte Equifax Australia Google Privacy, Safety and Security Australia

154

W O M E N I N S E C U R I T Y M A G A Z I N E

InfoTrust MF & Associates Monash University Orro Smokeshield Sydney Metro Enterprise Security Trend Micro

N O V E M B E R • D E C E M B E R 2023


CHAMPIONING DIVERSITY AND INCLUSION: A CONVERSATION WITH AN INDUSTRY LEADER

In this candid conversation with MF & Associates we delve into the strategies and principles that have propelled the organisation to be recognised as the Best Place to Work for Women in Security. Their insights shed light on the impact of their initiatives, the metrics used to assess progress, and the vital role diversity plays in the world of security. Since MF & Associates’ inception, a commitment to diversity has been at the forefront of its mission. The leadership team emphasised the importance of actively seeking a diverse workforce from day one to avoid the common pitfall of ending up with a homogeneous team. The organisation has strived to make decisions through the lens of diversity, benchmarking salaries at each band to remove promotion hurdles and ensuring that gender is no barrier to progress. Measuring the effectiveness of diversity and Maintaining these initiatives is a challenge for a

inclusion initiatives requires the tracking of several

young company like MF & Associates. It hopes its

key metrics, including salaries, event attendance,

inclusive culture will endure as it grows and it is

promotions and workforce diversity numbers. These

committed to reinforcing its intent through policies

metrics help ensure the company stays on track and

that reflect these values.

does not drift away from its commitment to diversity.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

155


For MF & Associates, diversity and inclusion are

positive culture. Externally, it demonstrates to the

more than mere buzzwords: they are the bedrock

industry that success and doing the right thing

of its success. The leader believes the company’s

are not mutually exclusive. The company’s clients,

culture is what attracts staff and clients. It is a

in particular, have shown strong support for its

talking point when engaging with clients and a top

approach to diversity.

priority when hiring new staff. The company’s aim is to lead by example, and to be the change it wants to

For organisations in the security industry looking

see in the industry.

to improve their diversity and inclusion efforts, the leader's advice is straightforward: Do it. They stress

MF & Associates takes a unique approach

the importance of addressing diversity at every level

to mentorship and sponsorship programs. It

of the organisation and finding systemic ways to

encourages mid and senior-level staff to mentor

do better.

externally, thereby supporting the broader industry and attracting more diverse talent into the field. The

MF & Associates was recently acquired by Fujitsu

focus is on addressing both the skills and quality

but will continue to operate as a stand-alone entity,

gaps in the industry.

rebranded as MF&A, a Fujitsu company. It will help strengthen the growth of Fujitsu Uvance, which

However, promoting diversity and inclusion in

focuses on the resolution of societal issues and

security comes with its own set of challenges.

contributes to customer growth through cross

The industry as a whole faces issues of gender

industry digital solutions. MF&A’s commitment to

and diversity, and the organisation's senior team is

diversity and sustainability will further support Fujitsu

committed to tackling these issues head-on. The

in achieving these goals.

strategy involves hiring diverse candidates, providing training to non-cyber trained staff, removing barriers

In conclusion, the company’s insights and

to entry and nurturing the next generation of leaders.

experiences provide a valuable roadmap for organisations seeking to prioritise diversity and

156

Being recognised as the best place to work in

inclusion in security. Its story demonstrates that

security for diversity and inclusion brings internal

doing the right thing can go hand in hand with

and external benefits. Internally, it validates the

success, ultimately benefiting both the organisation

hard work of staff members and reinforces their

and the industry as a whole.

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


Want to get matched with Lead Gen experts but dont know where to start?

Our solution experts can help you find the right supplier, Looking to streamline your B2B lead generation process?

Want to use multiple suppliers but dont have time to coordinate? Need a consistent stream of leads coming into the sales team? Looking to tap into new markets? Need end-to-end lead nurture programs?

LET US HELP YOU OVERCOME YOUR LEAD GEN CHALLENGES REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.

With:

aby@source2create.com.au charlie@source2create.com.au source2create.com.au


Australia's Most Outstanding in Protective Security WINNER

Christina Rose Global Security Executive, Qantas Christina's leadership and innovation have profoundly reshaped national screener training standards. Christina's unwavering dedication to public safety and protective security shines through her advocacy, mentorship, and speaking engagements. Her contributions are undeniably deserving of recognition for the lasting impact on regulatory design and training standards, as well as her influential mentorship in the industry.

HIGHLY COMMENDED

Amy Ruth Hewson Chief Executive Officer, Mitchell Personnel Solutions Amy's exceptional leadership shines through in her dedication to understanding and fulfilling the needs of women and diverse groups, all while maintaining strong business practices. Amy's ability to harmonise business requirements with personal needs has made Mitchell Personnel Solutions a standout, caring, and empowering workplace, as evidenced by team-building activities and individual recognition.

FINALISTS

Amy Ruth Hewson Chief Executive Officer, Mitchell Personnel Solutions

Jacinta Thomson Director (SES1) Police Enquiry and Data Sharing department Victoria Police

Vannessa Van Beek

NOMINEES

Christina Rose

Amy Ruth Hewson

Nicole Stephensen

Global Security Executive Qantas

Jacinta Thomson

Radha Ramadev

Joanne Sam

Rebecca Simmons

Sonya Brackenridge

Lesley Arundel

Roxanne Pashaei

Lisa Lay

Sandy Ortmanns

Liz Gomez

Shweta Pandey

Marina Azar Toailoa

Sonya Brackenridge

Christina Rose

Vannessa Van Beek

Nicole Neil

Yvonne Sears

Command Security Adviser Defence Australia

Yvonne Sears Managing Director ISD Cyber

National Senior Director, Avanade

158

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


IN THE SPOTLIGHT WITH CHRISTINA ROSE: WINNER OF AUSTRALIA'S MOST OUTSTANDING IN PROTECTIVE SECURITY AWARD

In the realm of protective security few are as deserving of recognition as Christina Rose, winner of Australia’s Most Outstanding in Protective Security award. Christina’s journey in this critical field is nothing short of remarkable, shaped by years of dedicated service and a relentless commitment to safeguarding organisations and assets.

THE PATH TO EXCELLENCE Christina’s career path has been defined by diverse roles and exceptional contributions. Her journey began with extensive work on the Federal Government’s National Transport Security policy and regulatory settings. From there she transitioned into the private sector, serving as an airport security manager at both international and regional airports. Later, she assumed the role of an airline executive responsible for overseeing security across the Americas, Canada and the Pacific.

I S S U E 17

WOMEN IN SECURITY MAGAZINE

159


Her responsibilities also included active participation

the challenges posed by COVID, ensuring the

in regulatorily required domestic airport and airline

continuation of their employment and conditions.

safety committees. It’s this breadth of experience that makes her deserving of this award.

Moreover, her role has extended beyond Australian borders. It includes her invaluable contribution to the

A COMMITMENT TO PROTECTING WHAT MATTERS MOST

global restart of air operations by the Qantas Group

Protective security is more than just a job for

her to the US, Canada, South East-Asia and New

Christina; it’s a pathway instigated by the events of

Zealand where she has connected with government

September 11, 2001. The vital role of safeguarding

regulators, industry representatives, airline and

critical infrastructure and people deeply resonated

airport colleagues along with local law enforcement

with her, setting her on a path to excellence in

with the view to re-establishing safe and secure

the field.

aviation services. She works closely with her Sydney

of airlines post-COVID. Her dedication has taken

based colleagues who also have contributed

SIGNIFICANT MILESTONES

significantly to the restart and continuation of

Christina’s journey is marked by numerous significant

operations. Christina acknowledges her immediate

achievements. She was instrumental in delivering

colleagues in Group Security for the mutual support

the Air Security Officer program, a vital component

they share.

of aviation security. She was influential in getting every aircraft in Australia having 60 or more seats retrofitted with hardened cockpit doors.

FOSTERING COLLABORATION AND COMMUNICATION In the world of protective security, collaboration

160

Christina’s contributions extend to the establishment

and communication are the pillars of resilience.

of the National Aviation Transport Security

Christina’s extensive experience and industry

Screener training program across the industry.

networking have been instrumental in fostering

Her steadfastness is evident in her successful

cooperation among diverse stakeholders, enhancing

navigation of 120 aviation screening staff through

security practices and resilience.

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2023


CHALLENGES AND THE ROAD AHEAD

presented aggressively, and it’s essential to

The field of protective security faces its own set

stand strong and unwavering.

of challenges. One of the most pressing issues, as Christina notes, is the lack of acknowledgment

AN HONOURABLE ACKNOWLEDGMENT

of foundational infrastructural physical protective

Being recognised as Australia’s Most Outstanding in

security measures. These measures, which

Protective Security is an honour deeply appreciated

safely and efficiently facilitate people’s travel

by Christina. This acknowledgment, which follows

from point A to B, are often overlooked but are of

a bravery award in 2020, highlights the critical

paramount importance.

need for unwavering vigilance and attention to emerging threats in the aviation sector. As a

MENTORSHIP AND LEADERSHIP

sector critical to economic growth and personal

Mentorship and leadership are pivotal in achieving

wellbeing, the continued advancement of protective

excellence in protective security. Christina’s

security remains a top priority for Christina and the

contribution to the iLead cross-sectoral mentoring

broader industry.

program—a leadership program run by the University of Newcastle (NSW) has garnered positive feedback

Christina’s journey is not just one of personal

and has been a source of enjoyment. Additionally, her

achievement but also a testament to the collective

involvement in graduate programs, particularly during

dedication of those who work tirelessly to ensure the

her tenure with the Australian Government, has

safety and security of our communities and critical

led to numerous appointments to senior executive

infrastructure. In honouring Christina, we recognise

positions. Her dedication to storytelling has been

the unyielding commitment of those who stand on

instrumental in inspiring and engaging newcomers

the front lines of protective security, safeguarding

in the field, encouraging them to become seasoned

our world in the face of ever-evolving challenges.

experts in their domains.

DIVERSITY AND INCLUSIVITY In a world increasingly valuing diversity and inclusivity, Christina believes these attributes may not be critical in the realm of protective security. For her, it is essential to find the best person for every role, with specific requirements being a foundation of knowledge, particularly in legal matters and industry dynamics.

NAVIGATING CHALLENGES As a veteran in protective security, Christina has navigated numerous challenging situations during her career. However, these incidents, too many to recount, have not deterred her but have instead contributed to her wealth of experience.

ADVICE TO ASPIRING WOMEN For women aspiring to enter the protective security industry, Christina offers some valuable advice: have a backbone, be emotionally intelligent and have a solid understanding of your role. Challenges will be

I S S U E 17

WOMEN IN SECURITY MAGAZINE

161


Australia's Most Outstanding in I T Security SPONSORED BY

WINNER

CyberCX

Lisa Currie Chief Information Security Officer, The Bureau of Meteorology Lisa's excellence in fostering collaboration, driving innovation through psychology-based security insights, and maintaining a strong commitment to regulatory compliance and talent retention, all essential for safeguarding critical assets, is truly commendable. Her notable achievements, such as her holistic security planning for the Bureau of Meteorology and foundational work on the Victorian Government's Child Link System framework, exemplify her dedication and impact. Lisa's exceptional qualities, including leadership, innovative security strategies, commitment to diversity, and passion for knowledgesharing, collectively make her a standout winner in the field.

FINALISTS

NOMINEES

Angela Champion

Adeline Martin

Jessica Dodson

CEO WHITE ROOK Cyber

Angela Champion

Joannie Lee-Lang

Anna Aquilina

Katherine Robins

Anubha Sinha

Kristy Wilson

Caity Randall

Lisa Currie

Cecily Rawlinson

Marianne Cologon

Daisy Sinclair Founder | CEO Cyber8Lab Pty. Ltd.

Lisa Currie Chief Information Security Officer The Bureau of Meteorology

Christie Chan

Mitra Minai

Connie McIntosh

Nadia Taggart

Shamane Tan

Daisy Sinclair

Natasha Passley

Chief Growth Officer Sekuro

Daniela Fernandez Palacios

Nicole Neil

Fiona Long

Emily Wade

CEO and Founder InfoSecAssure Pty Ptd

Emma Neville

Cecily Rawlinson

Fiona Long

Director Wa Cyber Security Innovation Hub

Erin Harriott Gergana Winzer Isla Thomas Jana Dekanovska Jeevitha Vijayakumar Jennifer Frances

162

W O M E N I N S E C U R I T Y M A G A Z I N E

Nivedita Newar Puneeta Chellaramani Renee Shephard Roxanne Pashaei Sarah McAvoy Sarah Young Shamane Tan Shyvone Forster Sulata Bhattacharjee

N O V E M B E R • D E C E M B E R 2023



SAVE THE DATE

10 OCT 2024

RISING FROM THE ASHES LIKE A

Phoenix,

Strength,

WE DISCOVER OUR AND THE LIMITLESS

Resilience,

POWER OF

ITHIN US. W h Rebirt

2024


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.