18
JANUARY • FEBRUARY 2024
W W W. W O M E N I N S E C U R I T Y M A G A Z I N E . C O M
ASSOCIATIONS & GROUPS SUPPORTING THE WOMEN IN SECURITY MAGAZINE
07
08
MARCH • APRIL
IN 2022, YOU CAN NO LONGER TAKE SECURITY WORKERS FOR GRANTED P10-13 AS THE SECURITY THREAT MORPHS, DEFENSIVE TEAMS MUST CHANGE TOO
MAY • JUNE
WHO RUNS
P76-79
20 22
IF YOU CAN’T SPEND YOUR WAY TO GOOD SECURITY THIS YEAR, TRY FOCUSING ON YOUR PEOPLE P94-97
YEAR OF THE SECURITY WORKER
W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M
the
WORLD W W W. W O M E N I N S E C U R IT Y M A G A Z I N E . C O M
OFFICIAL PARTNER
SUPPORTING ASSOCIATIONS
CONTENTS
6
INDUSTRY PERSPECTIVES
FROM THE PUBLISHER
Cyber-ready boardroom: blueprint for success
48
Mind the (gender pay) gap in cybersecurity: ensuring pay equality for all 52
Wishing you all a Merry Christmas and a Happy New Year! Catch up in 2024!
COLUMN Breaking stereotypes
44
On the edge of innovation: breaking boundaries in 2024 by learning from 2023
46
From the Source2Create team
WHAT’S HER JOURNEY?
Beverley Shimmin
10
Elif Cansu Güleç
12
Robyn Frye
14
Ejona Preci
18
Meaghan Bradshaw
21
Maria Teresa Jimenez Salinas
24
Natasha Towner
26
Ayça Güzünler
30
Colette Hanley
33
Marina Gistau
36
Emilly Ricarte
42
JOB BOARD
80
98 THE LEARNING HUB
Strengthening cyber resilience through capacity building
56
Diversity in cybersecurity at Spark: three realities
60
Inspiring young girls into STEM
66
ISACA leaders from across the globe reflect on the future of women in security 70 I’ll make my own way – a desire for a chance to succeed
74
Embracing purpose: my journey to inspire young girls into tech
78
JANUARY • FEBRUARY 2024
FOUNDER & EDITOR Abigail Swabey
ADVERTISING Abigail Swabey Charlie-Mae Baker
NEW ZEALAND WOMEN IN SECURITY AWARDS 2023
#2023WISAWARDS
94
107 THE NEW ZEALAND WOMEN IN SECURITY AWARDS 2023 COVERAGE
M A G A Z I N E C O O R D I N ATO R Jane Saafi
JOURNALISTS David Braue Stuart Corner
SUB-EDITOR
TURN IT UP 102
Stuart Corner
DESIGNER Rachel Lee
Source2Create Pty Ltd is the publisher of this magazine and its website (www.womeninsecuritymagazine.com).
©Copyright 2023 Source2Create. All rights reserved. Reproduction in whole or part in any form or medium without express written permission of Source2Create is prohibited.
OFF THE SHELF 104
STUDENT IN SECURITY SPOTLIGHT Safa Baalfaqih
86
Farkh Leka Hashimy
87
Felicity Le
90
FROM THE PUBLISHER Charting the course: the future of women in security
T
he landscape of security, both digital
leadership to effectively navigate the complex and
and physical, has traditionally been
multifaceted nature of security threats. As women
male-dominated. However, a seismic
continue to prove their capabilities, more leadership
shift is occurring, and women are
opportunities are likely to open up.
increasingly making significant strides in the security sector.
CHALLENGES TO OVERCOME Persistent gender bias: Despite progress, gender
Historically, women have been underrepresented in
bias remains a challenge in the security sector.
security-related roles, facing barriers that impede their
Overcoming stereotypes and biases is crucial to
entry and progression. However, recent years have
ensuring women have equal opportunities for growth
witnessed a growing recognition of the importance
and advancement in security roles.
of diversity in security teams. Women are breaking
Solution: Organisations can implement diversity
through these barriers, contributing their unique
training and unconscious bias awareness programs
perspectives and skills to address the complex
and establish a culture that values and rewards merit
challenges of the modern security landscape.
regardless of gender.
TRENDS SHAPING THE FUTURE
Lack of representation in leadership: While more
Increasing representation: Organisations are
women are entering security roles, there is still a
actively working towards creating more inclusive
noticeable gap in leadership positions. Breaking
environments, recognising the value diversity brings
through the glass ceiling requires concerted efforts
to security. As more women enter the field we can
to provide mentorship, sponsorship and leadership
expect a shift towards more balanced representation
development opportunities for women in security
in various security roles: from cybersecurity to
Solution: Establishing mentorship programs and
physical security and beyond.
leadership training initiatives and actively promoting women into leadership positions can address
Specialised roles and expertise: The evolving
this gap.
nature of security threats demands specialised skills and expertise. Women are increasingly pursuing
Encouraging STEM education: Encouraging girls to
education and training in cybersecurity, digital
pursue education in science, technology, engineering
forensics and other specialised security fields. This
and mathematics (STEM) is vital for increasing the
trend is likely to continue, with women playing pivotal
pool of qualified women entering security-related
roles in developing innovative solutions to emerging
fields. Early exposure and mentorship can play a
security challenges.
pivotal role in shaping career choices. Solution: Collaborations between educational
6
Leadership opportunities: The ascent of women into
institutions, industry and non-profit organisations can
leadership roles within security is a promising trend.
facilitate initiatives that promote STEM education for
Organisations are recognising the need for diverse
girls and young women.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Abigail Swabey
TRANSFORMATIVE POTENTIAL The future of women in security holds transformative potential for the industry as a whole. Embracing diversity brings a range of perspectives and approaches to problem-solving, fostering innovation and adaptability in the face of evolving threats. Women’s skills, such as collaboration, communication and attention to detail are assets that can enhance the effectiveness of security teams. I truly believe the future for women in security is bright, marked by increasing representation, specialised expertise and leadership opportunities. While challenges persist, the momentum towards a more inclusive and diverse security sector is undeniable. Organisations that champion diversity and actively work to overcome existing barriers will not only benefit from a broader talent pool but also gain a competitive edge in addressing the complex security challenges of the future. As women continue to shape the security landscape, the industry as a whole stands to gain from their diverse perspectives, skills and leadership.
The Source2Create team extends heartfelt gratitude to all our supporters, contributors, sponsors, mentors, and friends. The Women in Security Magazine owes its success to your unwavering support, and we are eternally thankful. Special thanks to our judges, sponsors, volunteers, nominators, and nominees for the 2023 Australian and New Zealand awards. Together, united, we are spreading our message far and wide, fortifying our industry in the process. Wishing you all a Merry Christmas and a Happy New Year! Catch up in 2024!
Abigail Swabey PUBLISHER, and CEO of Source2Create www.linkedin.com/in/abigail-swabey-95145312
aby@source2create.com.au
I S S U E 18
WOMEN IN SECURITY MAGAZINE
7
AUSTRALIA’S
BEST SELLING S AN AUD I
OK BO
SO AL
A LE
O
AVAIL AB
CYBER SECURITY BOOK
Bought it for my daughter and we are both very impressed! Great artwork as well as the book itself. She is a 9 year old avid internet user, and I do worry about what she gets up to and the choices she makes. We limit her access and have cyber security overlays on her devices - but we are not too clued up on cyber security so it was always a worry. This book has been great to get conversation flowing that I didnt really know how to start up, and it has definitely taught her some worthwhile lessons on things to look out for and "shadowy corners" of the internet to be cautious of! I recommend this book.
BUY THE EBOOK
BUY THE AUDIOBOOK
BUY THE PAPERBACK
WHAT’S HER JOURNEY?
manager that software developers did not make good project managers. “If you tell me that I can’t do something it makes me even more determined to do it,” she says. Her 20 year stint came to an end in 2003 when the
Beverley Shimmin Program Manager, Cybersecurity Program at Curtin University
company was taken over and the IT department in which Shimmin worked moved to another town 200km distant and she took voluntary redundancy. “I did not want to move my family,” she says. “So I went out into the world of contracting taking a
B
role as a systems analyst/IT project manager in a major insurance company on their transition to everley Shimmin probably has the longest
the insurance arm of a major UK bank followed by
career journey to have been recounted in
another insurance company transition into the same
Women in Security to date: 40 years, 23 of
bank then moved into release management using the
those in project management. Born in the
knowledge that had gained during Y2K.”
UK, her early career aspirations were to
be a programmer, back in the days when COBOL was
MIGRATION TO AUSTRALIA
widespread, but she was stymied.
Her first contract role lasted three years, until 2007, after which Shimmin and her family migrated to
“I had taken and passed the aptitude tests for
Western Australia where she took a contract IT
programming for the big four banks in the UK. However,
project manager role in retail banking in Perth. That
the banks only wanted graduates for their trainee
lasted three years, then Shimmin returned to the UK
programmer roles, so I didn’t get a role, but Lloyds
and the role she had left in 2007.
Bank took six of us on as trainee testers,” she says. She spent two years in the UK before returning to “My dream was still to be a programmer, so I kept
Perth in 2010 and spent the next 20 years in a variety
knocking on doors. One year later I started as a
of contract project management roles. Her pivot
trainee programmer with a life and pensions company
into cybersecurity started in 2018 when she scored
on a graduate program with four graduates and one
a contract on a cybersecurity project in the banking
guy who hadn’t been to university.”
sector and started studying for a graduate certificate in cybersecurity, taking units in cybersecurity, network
And there Shimmin stayed, for almost 20 years
technologies and network security.
through various roles: software developer, systems analyst, business analyst, project manager, release
“My role was to delivery several cybersecurity projects
manager for Y2K. “This was a beautiful company to
the largest of which was an identity and access
work for, like a family. I was lucky to have had four
management system,” she says. “I was very excited
children during this time,” she says.
about this role as it was back in banking, which was where I had started my career in IT. Prior to
10
During here time there she transitioned from software
this, I knew very little about cybersecurity. I quickly
development to project management because
learnt that I needed to understand cybersecurity and
“Feedback that I received on my ability to explain
identity and access management if I was to be able
technical information to non-technical people made
to deliver this significant project, plus projects in
me consider a change of direction into project
vulnerability management and intrusion detection and
management.” This despite being told by her line
prevention software.”
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
Shimmin was hooked. “Nine months into this contract
With her masters in cybersecurity Shimmin joined IBM
I knew I enjoyed the cyber projects and wanted to
in 2022, her first fulltime job in over 20 years. “I was
learn more,” she says. “I took the plunge and enrolled
part of the leadership team leading staff and multiple
at Edith Cowan University to complete the Accelerated
projects, mentoring juniors and graduates. I was the
Graduate Certificate in Cyber Security. This is a 100
onsite resource assisting with cyber initiatives,” she says.
percent online course which you can fit around work. There are three extremely structured seven weeks
She did not stay long. “I decided to return to
units, which they state as 20+ hours a week.
contracting in 2023 when the role I am currently doing as the program manager for a cybersecurity program
“The three units were: cybersecurity, network
of work was raised with me,” Shimmin says.
technologies, and network security. It was a baptism of fire as this was my first time in academia since
CAREER HIGH POINT
1983. This was my ‘aha moment’. It was six months
She describes this as the high point of her career. “I
of extremely intense study on top of full-time contract
have both the cybersecurity knowledge through the
work and family life of husband, four young adults
masters of cybersecurity and the project/program
and some of their partners, two dogs and two cats.
management knowledge. I understand what we
During this time, I changed contracts and worked
need to do and why we are doing it. My major is
as a cyber project manager for a managed services
cyber governance. I can read the information in the
provider in the utilities industry delivering IT and OT
product specifications of the third party systems we
projects on their cyber improvement program.”
are implementing and understand the problem being resolved. I do not have imposter syndrome in this
GAINING A MASTERS IN CYBERSECURITY
area. All my analysis, development, testing, masters
And she continued her cybersecurity education,
in cybersecurity, people and project management
enrolling for a masters in cybersecurity. “I loved the
knowledge have come together and fit like a jigsaw.”
breadth of cybersecurity,” she says. “I felt that my 20 years in development had honed my analytical
And Shimmin has become an active member of
brain. I had a reasonable understanding of networks
Perth’s cybersecurity community. She is a member
and network equipment from previous project
of the Australian Women in Security Network,
management roles. I felt I was ready to complete
Second Thursday of the Month club (STotM), Cyber
this masters. I had waited a very long time to do this
Risk Meetup, the Australian Information Security
tertiary education.
Association, Women in Technology WA and Students of Cyber.
“This was during Covid which meant I had times of working from home which meant no traveling to the
And she says, after coming late to the industry she
office. I could finish my day’s work, switch off my
is now a ‘cybersecurity evangelist’. “My aspirations
work computer, have a cup of tea and start studying.
for the years I have ahead of me in my career
In 2020 I completed six units. Weirdly, the time of
would be for some short courses in leadership
isolation enabled me to not feel guilty about studying
within cybersecurity, explaining the cybersecurity
or taking time away from my family. I have a very
landscape to the uninitiated, and how to protect
supportive husband whose career took a back seat
yourself and your company. To those I encounter
when we started our family, and he was an at home
I’m a cybersecurity evangelist on the simple steps
parent in the 1990s: a trail blazer.”
to protect yourself. The evolving security landscape means that, for the foreseeable future, there will be
However, her decision to study for a masters did
cybersecurity uplift programs to be involved in.”
raise some eyebrows. “There were some people who wondered why I would bother to study this late in my career,” she says. “My answer to this is ‘I’m not dead yet!’”
I S S U E 18
www.linkedin.com/in/beverley-shimmin-msc-cybersecurity-5a72a14
WOMEN IN SECURITY MAGAZINE
11
a project to diversify employment in the sector. We continue to seek support in this regard.” She says this is one of the biggest challenges the
Elif Cansu Güleç Cyber Security Consultant
project faces, because “In every new workplace we go to, as women, we have to prove ourselves.”
RUNNING CYBERHAT.ONLINE At CyberHat.Online Güleç oversees the platform’s operations, and content creation and networks with professionals and organisations in the industry
A
whilst keeping up with the latest cyber threats and security technologies. ccording to the World Economic Forum’s Global Gender Gap Index 2020, which
“What I enjoy most is the opportunity to make
benchmarks national gender gaps on
a meaningful impact by increasing diversity in
economic, education, health and political
cybersecurity,” she says. “One of the biggest
criteria, Türkiye ranks 133rd out of 153
challenges is gaining visibility and support for our
countries for economic participation and opportunity,
initiative. I hope to continue growing CyberHat.Online,
113th for educational attainment and 109th for
making it a vital resource for women in cybersecurity.
political empowerment and 130th for the overall gender gap.
“With cybersecurity continuously evolving, I anticipate new challenges and opportunities. Staying informed
It’s a reality that Elif Cansu Güleç, as a woman trying
about emerging threats and solutions will be
to make a career in IT, knows only too well. She says
crucial. I also expect the demand for diverse and
she “loved writing code for embedded systems” but
inclusive teams to grow, aligning with CyberHat.
quit because of gender discrimination in the male-
Online’s mission.”
dominated industry. She was told she “wrote code like a man” as if that were a compliment. She was
Güleç says she thinks a career in security has
constantly required to prove herself, frequently given
always been a part of my life, and certainly she was
tasks outside her formal role, and told that preference
introduced to computers at an early age.
would be given to male candidates when applying for jobs.
“My journey began when I woke up one morning at the age of four and was astonished and frightened
12
Frustrated with this reality, Güleç started her own
by a talking computer,” she recalls. “My parents
business: CyberHat.Online, with a mission to
showed me that the computer could say whatever
“enable curious and talented individuals in the field
I wanted. After that, I would press random buttons
of cybersecurity to come together and share their
and was curious about how devices such as
knowledge and experience.”
computers worked.
She explains: “We publish daily updates about new
“In the 2000s, when I was in primary school, I learned
vulnerabilities and we write blog posts about some of
how to remove the cards from computers, and how to
the vulnerabilities we deem important. We also have
properly insert them and turn them on.”
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
By the time she was learning to read and write, Güleç
networking, IT, Web programming and databases and,
was also dabbling in computer programming and got
as a freelancer, worked in embedded systems and
introduced to Pic programming in middle school, and
data recovery, IT and cybersecurity.
to Telnet. In addition to her work at CyberHat.Online, Güleç is She then went on to study database systems at the
actively engaged in industry associations, posts on
Anatolian Technical High School and came first in a
LinkedIn about vulnerabilities, provides training and
programming competition run by a university, which
consulting services to a number of companies, and
led to her being offered a place at the university.
participates in the work of the BMO Cybersecurity
Instead she chose to study at Yaşar University,
Commission and in CTF competitions.
gaining a bachelor’s degree in computer engineering. Throughout she says: “My family, friends and
MASTERS IN ROBOTICS AND AUTOMATION
university professors have been my constant support.
She then went on to gain a Master’s degree in
They encouraged me to pursue my passions. I’ve
Mechatronics, Robotics and Automation Engineering
also had mentors who guided me through my
from KTO Karatay Üniversitesi.
cybersecurity journey and provided valuable insights.”
During her high school and university years Güleç says she had many different internship experiences in
www.linkedin.com/in/elif-cansu-gulec
places that dealt with computer repair, data recovery,
I S S U E 18
WOMEN IN SECURITY MAGAZINE
13
Robyn Frye Vice President, Cybersecurity GRC at Workday
O
ne of the biggest challenges women
and your family understands and enables your
face in their cybersecurity careers is
career aspirations.”
balancing career aspirations with child rearing; and even contemplating this
And her experience with this woman was not a
possibility can be daunting. A woman in
one-off, Frye says. “My most painful leadership
this situation might expect her female superior to be
interactions have unfortunately come from other
understanding and supportive, but Robyn Frye found
women who I thought I looked up to.” In contrast she
the exact opposite.
is full of praise for one male superior in particular, and her account of this relationship contains valuable
“When my partner and I were considering starting
lessons for any leader.
a family I asked for advice from a senior woman, who had three children of her own, about whether
A LEADER TO LOOK UP TO
it was possible to have a successful career whilst
“I reported to a very seasoned male executive for
also having children,” she recalls. “The cold response
two years in my recent history. At first I was very
I got back was that my only option for a successful
intimidated to be in a direct reporting line with
career with kids was to have my partner stay home
this person who I felt was way too seasoned and
full time or to outsource the raising of my children to
experienced to have me as a direct report,” Frye says.
someone else (full time nanny, grandparents, etc). I felt so shut down by this definitive and seemingly
“What I found from working with this leader was that
factual statement.”
he had the most profound impact on my confidence. He took the time to understand me and help me see
However, undeterred Frye did start a family and, while
what my unique strengths were as a leader. He was
she acknowledges being a working parent is not easy,
very transparent with information and his perspective.
says: “After a decade of experience, I feel confident
This helped me to quickly establish trust and to feel
it is possible to be an engaged and present parent
confident with sharing my unique perspective and
while also succeeding in a challenging career. The
opinions with him. In this leader’s presence I felt very
weights are rarely equally balanced between family
confident in who I am and what I knew, as well as
and work but shifting back and forth is manageable
respected and valued.
when you work with a strong and supportive team
14
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
“I’ve learned from this relationship that a leader
and confidence to a strong, high performing female
can inspire confidence by demonstrating some
leader who has proven experience leading large
vulnerability, extending the olive branch of trust first,
teams and managing multi-million dollar projects with
and connecting on an authentic level. It doesn’t take
exceptional client satisfaction.”
much to have a profound impact on a team member.” Initially Frye worked in EY’s external audit services
A VP AT WORKDAY
organisation and, as she moved up the ranks,
Frye is vice president of cybersecurity governance,
focussed on SOX, HIPAA, healthcare regulatory
risk and compliance (GRC) at Workday, a global
compliance and governance. “I loved forging strong
company headquartered in the US, that develops and
relationships with my client stakeholders and
provides cloud-based human resources and financial
helping them solve their most pressing regulatory
management systems for large businesses: a one-
and compliance issues,” she says. “At EY I partnered
stop-shop for managing a company’s workforce,
closely with talented professionals from different
including payroll, timesheets, benefits and more.
disciplines and skill sets. I learned the joys of
Since June 2019 she has been based in Workday’s
partnership and teamwork and developed strengths in
Auckland office.
coaching and performance management.”
It is her second role in a two decade long career in
After 13 years, parenthood and its conflicts with the
cybersecurity. Frye grew up in California with an
prospect of partner status prompted Frye to explore
interest in and exposure to technology, “down the
other possibilities. “As a new mother I was struggling
road from the garage where HP was born and the
with balancing my various identities, but I also knew
run-down Victorian house where Google got its start,”
that what I loved most about my job was delivering
she says. “I asked for a dial up modem for a birthday
great work, not selling services. I decided to explore
present when I was 10 years old so I could connect
opportunities outside of EY and, with the support of
with friends in online chat rooms, well before the days
an extensive professional network, I interviewed for
of AOL Instant Messenger!”
and landed a role as the senior manager of enterprise technology compliance at Workday in California.”
Despite her early interest in IT, Frye’s first career inclinations were to become an architect, a
Frye confesses to being, initially, terrified at the
psychiatrist or a business owner, but she was
prospect of a new role in which she would be faced
encouraged by her parents to consider skills that
with leading a team without deeply understanding all
would best prepare her for future opportunities in
aspects of her accountabilities, but says: “Workday
technology. She enrolled at the California Polytechnic
was a perfect fit for me: high growth, fast paced,
State University in San Luis Obispo and gained a
genuine people who work hard but also know the
dual major in Management Information Systems
value of fun, and a work culture that was supportive
and Finance. She took a job with EY (then Ernst
of working parents.
& Young) and stayed for 13 years where she had what she describes as the best foundational
“I took the approach of being an inquisitive servant
career experiences.
leader. I asked questions, rolled my sleeves up and slowly got acclimatised. Before I knew it, I had
FOUNDATIONAL EXPERIENCES
spent eight years in that role, we had grown the
“The pace, breadth of experiences, apprenticeship
team by 400 percent, and many on the team had
model and continuous education model took me from
been promoted one or more times into roles of
being a university graduate with limited knowledge
increased accountability.”
I S S U E 18
WOMEN IN SECURITY MAGAZINE
15
MOVING TO NEW ZEALAND
business issue. I have to shuffle the deck frequently
In June 2019 Workday had a unique business
in order to ensure my time is spent where it is
opportunity that opened the door for Frye to re-locate
most needed.
to New Zealand, which her family jumped at the opportunity to experience.
“As a people leader, I work hard to constantly challenge my thinking about where I am needed
Now, she says a typical day comprises a combination
and how I can enable my team members to step up.
of meetings with the leadership team to drive
One mantra I use over and over is: ‘Is someone else
alignment and solve issues quickly, one-on-one
capable of taking this on?’ If yes, they should be given
meetings with a variety of Workmates on her team to
the opportunity to do it. This approach really helps
provide individual coaching or to review key initiatives,
challenge where I am needed and how I can better
one-or-one or small group meetings with peers,
enable my team.”
stakeholders and/or partners, solo working time to address strategic, performance or administrative
PAINFUL EXPERIENCES
accountabilities, a walk with a Workmate for
Frye says she has honed her leadership skills through
coffee or lunch to catch up informally, and usually
some painful experiences. “I’ve made mistakes that
time to participate in a cultural or fun event in the
I never thought would be possible to recover from.
Auckland office.
Spoiler alert - once those mistakes were discussed I always found my mind had interpreted the impact to
“I tend to start my day early to ensure enough time
be much larger than it really was.
with colleagues in Europe and North America, so I often take time during lunch to support my health/
“I will also admit that, as a people leader, I have
wellbeing and, when my son gets off school, to
made my fair share of mistakes in coaching and
connect with my family. My favourite part of the day
performance management. Regaining the lost trust
is always connecting one-on-one with workmates. I
of a team member is very hard to achieve. All of
love getting to know people on a personal level and
these challenging situations—or low points—are
helping them navigate a challenge or explore a new
painful to think back on but have also been powerful
concept or idea.
learning opportunities. I have a clear picture of the leader I never want to be. I encourage my team to
“I get so much pleasure from supporting others
push the boundaries even if it means we fail (fail fast,
and having them walk away feeling confident and
fix fast), and I always strive to coach and manage
energised. The biggest challenge to my role is
performance in a way that is ethical and fair for the
prioritising how to spend time in my day. Whether
talent as well as the team.”
it’s meetings, supporting a customer or prospect, deliverable deadlines or dealing with an unexpected
She says the high points of her career all centre around “working in exceptional teams to accomplish what felt impossible at the time.” These include a year-long project tackling Sarbanes-Oxley requirements for a Fortune 10 multinational corporation, a multi-year healthcare project that transformed its HIPAA compliance program, and three months in Santiago, Chile working with an entrepreneur to design and implement key performance indicators (KPIs). “While promotions are important career milestones, the moments I look back most fondly on, are where
16
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
I have been part of a team that has worked hard, in
Outside of cybersecurity Frye has been a board
unity and deep collaboration,” Frye says.
member for two non-profit organisations in the USA where she contributed her audit, compliance, process
CISO ASPIRATIONS
and leadership skills. “I love rolling my sleeves up
In her current role Frye reports to Workday’s CISO
to support a cause that I am passionate about,”
and a CISO role is one she aspires to “I automatically
she says. “This is key if you are going to take on a
feel embarrassed or even egotistical to state that
commitment outside of work obligations.”
aspiration,” she says. “but 20 years ago I would have never imagined I would have had the experience to
And those commitments could embrace further
be a vice president for a multibillion dollar technology
study. “At this point in my career, I’d love to have the
company. Who knows what is possible over the next
opportunity to step back into an academic setting to
two decades.”
further enhance my executive level skills,” Frye says. “While I enjoy learning in professional networking
She is already well immersed in the world of
settings (conference, multi-hour event, etc.), I’d love
cybersecurity. She has been a member of ISACA for
to immerse myself in a course with a diverse set of
almost 20 years and recently became involved in the
professionals to hone my skills in strategy, innovation
Women in Cybersecurity (WiCyS) community as well
and leadership.”
as serving as a committee member for an internal Workday group for cybersecurity women, known as SHEild.
I S S U E 18
www.linkedin.com/in/robynfrye
WOMEN IN SECURITY MAGAZINE
17
Ejona Preci Principal Manager - Cybersecurity Risk at FREENOW, President Women in Cybersecurity (WiCyS) Germany
E
jona Preci had graduated with a bachelor’s
A CAREER ROLLERCOASTER
degree in business informatics and started
Preci describes her career journey in cybersecurity
her first job as an IT specialist when an
as a rollercoaster. “There have been moments of
unpleasant experience led her to pivot
exhilaration, like successfully preventing a potential
into cybersecurity: she fell victim to a
breach, crafting a robust security strategy or
sophisticated phishing attack.
successfully delivering a keynote,” she says.
“Luckily, the impact was minimal. However, as you
“These highs make all the hard work worthwhile and
can imagine, I felt extremely overwhelmed, ashamed
reaffirm my passion for this field. However, there
and afraid of what other people might think of me:
have also been moments when complex topics felt
how could an IT specialist fall for a phishing scam?”
overwhelming or when new threats emerged faster
she recalls.
than we could adapt. In those times, doubt would creep in, making me question if I were doing good
That experience was a wake-up call. “It made me
enough. These moments have shaken my confidence
realise how vulnerable I was. That was the moment
many times but have never made me question if I had
I felt I wanted to know more about cybersecurity
taken the wrong turn by choosing cybersecurity as
and take a deep dive into this fascinating field,”
a profession.
Preci says. “So, I decided to shift my career. I made the transition to a cybersecurity position within a
“I think those moments of uncertainty are essential.
consulting company.”
They have pushed me to learn more, evolve and grow. They have made me realise that working in
She admits to not being well-prepared for the
cybersecurity isn’t about having all the answers but
transition. “When it feels scary to jump, that’s exactly
about the relentless pursuit of solutions to protect
when you jump. No risks, no rewards, that’s clear! I
what is most valuable.”
felt incredibly behind, especially when it came to me
18
talking about imposter syndrome. I was fighting every
And Preci has no regrets about any of the
day with imposter syndrome. That’s the subconscious
career choices she has made since getting into
I had to shut out, and it took me years to do that.”
cybersecurity. She says every choice, even the
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
seemingly odd ones, presented a learning opportunity.
In addition to her bachelor’s degree in business
“I’ve cherished the diversity of experiences because
informatics Preci gained a Master of Science in
they’ve all contributed to who I am today.”
Management Information Systems, which she says gave her a solid foundation in information technology
ROADBLOCKS
and business processes.
Along the way Preci admits to encountering her share of roadblocks, but regards them in a positive light.
GAINING CERTIFICATIONS
“Those obstacles were like stepping stones, helping
However, as Preci embarked on her cybersecurity
me climb to new heights. There were times when I felt
career, she noticed the market putting significant
underestimated, but I turned that into fuel to prove
emphasis on professional certifications, giving
them wrong.”
candidates holding these a competitive edge. So she pursued a variety of courses and training programs to
Preci’s initial leap into the unknown world of
bolster her expertise.
cybersecurity has certainly paid off. Today she is principal manager for cybersecurity risk with
“Some of the courses and certifications I completed
FREENOW, a company operating a host of mobility
include: Certified Information Systems Security
services including public transport, taxis, private
Professional (CISSP) Certified Information Security
hire vehicles, car sharing, e-scooters, e-bikes and
Manager (CISM) Certified in Risk and Information
e-mopeds under multiple brands throughout Europe
Systems Control (CRISC) ITIL 4 Foundation,” she says.
and the UK. “These certifications granted me a profound “My position consists of overseeing and implementing
understanding of cybersecurity principles, covering
all aspects of cybersecurity risk management, from
ethical hacking, risk management, threat and
risk identification to reporting and follow-up,” she
vulnerability management, incident management,
says. “What I enjoy most about it is the ever-evolving
hardware security, network security, security
nature of cybersecurity. It’s like being a detective, and
frameworks and standards.
I get a real kick out of trying to stay one step ahead of those threats.”
“However, during my career, I’ve encountered cybersecurity experts who didn’t study informatics,
In a sense, Preci says, her career aspirations have
yet they have been highly successful in their careers.
come full circle. “When I was younger, I wanted to
Therefore, studying informatics, computer science
study criminology, and then I changed my mind, but in
or any related field is not a prerequisite to enter the
the end, I feel like I sort of got back to the old dream.
cybersecurity field.”
Cybersecurity is indeed the discipline that tackles and handles online crimes.”
Nor does she see the qualifications she has gained as being the most important for her current role, listing
She describes her job as a chess match with hackers
these as effective communication, strategic planning,
who never take a coffee break. “Cybersecurity is a
business acumen and leadership.
very dynamic field, and you never know what you’re going to get on your desk in the next five minutes. But
“Cybersecurity managers should shift their mindset
that’s also what keeps it exciting.
to be more business-friendly, focusing on articulating security concepts in a manner that is accessible and
“A typical day for me involves a lot of meetings,
relatable to non-technical stakeholders, including
assessments and reading. I work with a brilliant
senior executives and board members,” Preci says.
team, and together we’ve created a wonderful work environment and a digital fortress around
“This involves translating complex technical issues
our systems.”
into clear, concise explanations. They need strategic
I S S U E 18
WOMEN IN SECURITY MAGAZINE
19
planning to develop and execute comprehensive
FOUNDER OF WiCYS GERMANY
cybersecurity strategies that align with the
Preci says she has always been passionate about
organisation’s objectives. Business acumen is
cybersecurity beyond her regular job, and is
necessary to understand the organisation’s operations
actively involved in cybersecurity outside her role
and goals to effectively integrate cybersecurity,
at FREENOW. She recently founded, and serves
and leadership skills to efficiently lead and manage
as president of, the German affiliate of Women in
cybersecurity teams to implement security measures
Cybersecurity (WiCyS) and is an active member of
and respond to incidents.”
several industry associations including ISACA and ISC2. She contributes to ISACA as a topic leader and
FOCUSSING ON AI
a subject matter expert, reviewing and crafting exam
Nevertheless she sees the need to advance her
preparation materials and writing articles and industry
technical knowledge, especially in the rapidly
news on cybersecurity topics.
evolving area of artificial intelligence. “In the coming years, I see AI playing a more significant role in
She has also started her own Cyberstar Talk’s
threat detection and response, anomaly detection
Podcast, which, she says, “serves as a valuable
and information security awareness training.
resource for cybersecurity professionals and
This expected development will certainly impact
enthusiasts alike, providing up-to-date industry news,
our current roles, making it even more crucial to
insights on emerging threats and engaging interviews
understand AI’s interplay with cybersecurity. As a
with influential cybersecurity figures from around
cybersecurity risk manager, staying ahead of these
the world.”
trends is not just a goal, but a necessity. Preci’s achievements saw her recognised in 2023 “I’m all set to level up my skills and qualifications
as one of 44 Cyber Power Women by Top Cyber
in this area by participating in specialised AI and
News Magazine and shortlisted for the Cybersecurity
machine learning courses that focus on cybersecurity
Woman of the Year Award 2023.
applications,” she says. “These courses can help me understand how to leverage AI algorithms and models to enhance security measures, automate threat detection and improve incident response. I also plan to actively engage with AI and cybersecurity communities,
www.linkedin.com/in/ejonapreci
www.ejonapreci.com
cyberstartalkspodcast.buzzsprout.com
attend conferences and participate in forums to stay informed about the recent developments of AI in cybersecurity.”
20
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Meaghan Bradshaw Senior Cyber Consultant on Microsoft Incident Response
M
eaghan Bradshaw is a forensics
response,” after embarking on a graduate program in
consultant in Microsoft Incident
the government.
Response (Microsoft IR, formerly Microsoft’s Detection and Response
“It was a role that let me be creative in my problem
Team -DART), and the first team
solving, pick apart entirely new ways to think, new
member to be based in New Zealand “supporting
skills to dig into, and satisfy my desire for root cause
organisations, solving digital mysteries, and chasing
analysis,” she says. “There’s nothing like picking apart
bad guys on a global scale,” she says.
forensic images to figure out what the bad guys were able to do, and I haven’t looked back since.
“As one of the earliest members of Microsoft IR in the APJ region I’ve had the honour of not only getting
“Working in incident response is rewarding every day.
to expand my influence to customers across the
Not only is every single organisation, compromise
world, but to build out an incredible team of fellow
and engagement unique in its own way, but I get the
analysts in New Zealand, Australia and more, taking
opportunity to work on a global scale and to be part of
on leadership roles quickly and fostering a team
a team that is rolled in to save the day.
culture of high quality output, supporting customers on the worst days of their careers, and feeding back
“JUST ANOTHER TUESDAY”
into the wider infosec community with published
“When we kick into an engagement, the organisation
research efforts.”
that called us is experiencing some of the worst days in their career, but for us it’s just another Tuesday,
Bradshaw graduated from the University of Otago
and being able to provide that level of comfort and
in 2017 with a bachelor of science in physics and a
guidance in such stressful situations never gets
bachelor of arts in computer science. She says she
old. Contributing to every engagement big or small
chose these because, “I’ve always wanted to get
is always rewarding, as is getting the opportunity
to the root of every problem, and had a passion for
to contribute to the wider efforts Microsoft
understanding how things work.”
supports on a global scale, or sharing learnings and recommendations from the front lines using that
She was introduced to what she says is “the crazy
global platform. This is something I feel incredibly
world of cybersecurity and in particular, incident
lucky to be a part of.”
I S S U E 18
WOMEN IN SECURITY MAGAZINE
21
However “just another Tuesday” Can be a stressful
Collaboration and relationships are, Bradshaw
day for Bradshaw. “Every customer engagement I
says, key to success in incident response, and she
walk into is inherently dealing with a high-pressure
believes these to be functions greatly undervalued in
environment with a group of people under an extreme
many roles.
amount of stress,” she says. “The level of pressure varies, of course, depending on the incident, but when
“The massive community of threat intelligence
it’s reactive, there’s always a heightened sense of
sharing is something I rely upon every day. Threat
urgency from every angle for the first few days.
intel is like a cheat sheet for incident response, and our people work together extremely closely
“Destructive engagements such as ransomware are
to understand what to hunt for, to share when we
particularly high-stress. To add to that, as a forensic
find new tactics, techniques and procedures during
analyst I’m not the one helping get an organisation
our hunting, and testing new attack techniques to
back online, but I am charged with finding out what
understand exactly what is going through the threat
happened, which takes time. We’re often faced with
actor’s mind and what’s left behind. Research is
needing to identify a few really key parts of the story
a massive part of making security professionals
as quickly as possible, sometimes with the added
successful as a whole, and being able to share that
pressure of an organisation needing our advice
research and how it applies to organisations through
to know when they can turn systems back on or
various blogs over my time on Microsoft IR has been
connect their network back to the internet to get their
incredibly rewarding.
operations back up and running. “As a member of an incident response team,
PUT ON THE SPOT
developing threat intelligence isn’t my day job, but
“I remember one incident where I was given data from
it’s absolutely imperative to the success of my
two systems and asked to provide a recommendation
threat hunting and team overall. So forming close
back to the customer after just two hours of analysis
relationships with threat intelligence teams across the
as to whether they needed to sever their corporate
company, and forming those relationships across the
network from a series of remote sites meaning
industry, are key to ensuring we’re the most prepared
significant impact to business operations. In those
we can be when encountering threat actors.
situations I always make sure to just speak to the evidence and make sure I provide as much context
“In the same vein, defenders can’t defend if they don’t
as possible on the risk associated with making
know what they’re defending against: one of the most
such high-pressure decisions so early on in a
important pieces of collaboration an organisation
destructive attack.”
can foster is between blue teams and red teams, and encouraging knowledge sharing between them.
BEWARE OF SILOS “I think that a trap security professionals can easily fall into is one that is experienced across every industry, and every organisation out there. People fall into silos, going forward in their day to day roles, only doing exactly what that role entails, without seeking out more diverse perspectives or understanding how their colleagues just a few teams over could help make their work more effective for everyone.”
22
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
“Sharing research and findings with the wider
implementing the principle of least privilege, and
community is also something every security
undertaking regular reviews of how corporate
professional should consider no matter their role.
environments are accessed with the goal of moving
While I’ve worked with Microsoft IR I’ve had the
toward a zero trust model.
opportunity to hunt nation state actors using neverbefore-seen techniques, and publish blogs detailing
“All of these steps will take some time for sure, but
not only the technical details of how those techniques
will help organisations continue to improve their
are able to work, but how to hunt for and defend
posture overall in the ever-changing threat landscape.”
against them with a global audience. And for herself, fighting threats Bradshaw says “With a wide visibility of compromises from across
learning about offence has done much to improve
various industry verticals and spanning the globe,
her defence abilities. “The most valuable educational
I’ve had the opportunity to collate and understand
opportunities I’ve taken as a defender have been
how particular threat actors always come back to
completing offensive certifications. There’s nothing
the same playbook no matter the target, and being
quite the same as being faced with a terminal and
able to share that knowledge with the world to ensure
having to figure out how to actually get in to help you
organisations are as prepared as they can be to stop
understand the motivations and actions taken by a
a threat actor in their tracks are some of the most
threat actor when they’re attacking the network you
rewarding contributions any security professional can
need to defend.”
provide back to the wider community.” And, says Bradshaw, threat actors no longer break
ABOUT MEAGHAN
in: they sign-in. “whether that’s through a simple
Meaghan Bradshaw is a senior cyber consultant
phishing email or social engineering of a helpdesk.
on Microsoft Incident Response (Microsoft
Something we’ve encountered in increasing volume
IR, formerly the Detection and Response
over the last year is threat actors just using features
Team – DART) with an education background
within products as intended, or abusing common
in physics, computer science, and offensive
misconfigurations coupled with carrying out those
security. She specializes in digital forensics and
actions at an incredibly aggressive pace.
incident response and has hunted sophisticated adversaries and novel tactics, techniques, and
“With the complexity of modern hybrid environments
procedures in complex customer environments
spanning masses of portals, tools and solutions,
spanning Windows, Linux, and Azure. Outside
when these aggressive actors make their way in,
of customer engagements she has piloted and
security teams within these organisations struggle
helped deliver several training initiatives within
with visibility across everything being abused, making
Microsoft IR, has contributed to internal tool and
it increasingly difficult to stop these actors in their
process development, and has authored several
tracks before they’re able to carry out actions on
public-facing research pieces on novel TTPs.
their objectives.” She says security staff need a single pane of glass offering a comprehensive view of complex
www.linkedin.com/in/meaghan-bradshaw-997ba7223
environments, along with “ensuring administrative actions have multiple steps of approvals, empowering
BlueHat Oct 23. S09: Thinking Outside The (Dead)Box
helpdesk staff to be aware of being targeted by social engineering, performing regular assessments of where privilege is held across your environment,
I S S U E 18
WOMEN IN SECURITY MAGAZINE
23
Maria Teresa Jimenez Salinas Senior Information Security Officer at Citi
M
y current position is as a senior
time commitments. At Deloitte I was an auditor
information security officer at
undertaking IT audits and evaluating internal IT
Citi. I have held this position since
controls of companies and various sectors.
December 2018. What I enjoy most about my job is that every day is
A START IN CYBERSECURITY
different: each day I can learn new requirements,
My time at Deloitte was a great learning experience:
new technologies and new security questions. Of
I got to know different ways of working from the
course, given the dynamism of the job, there are
companies I audited, as well as many people
many challenges. First is the need to have precise and
and management styles. This was where my
timely answers to all the questions clients (internal
security career started, because as an auditor you
or external) may have. Second is the need to always
are expected to identify and report any possible
be up to date. Self-study is key in this cybersecurity
security breaches.
journey. I studied at a girls’ school from kindergarten to high school where being surrounded by women
At this point I realised I wanted to pursue a career in
helped me understand how we think and how we
security. My first achievement was at Deloitte when
react to specific circumstances, especially when we
I was promoted from analyst to technology risk
are angry, upset or happy.
consultant. It gave me great satisfaction and boosted my career. After being an auditor, I changed roles in
24
I studied for an online double degree from Walden
my next job to become an internal control manager
University in the United States and for a Bachelor
at a Mexican media company where I initiated
in Information Technology Administration from the
the internal control function by developing and
Universidad del Valle de Mexico. Four years later
implementing policies and procedures for operations
I pursued a Master in Business Administration at
administration. This initiative broadened my outlook
Universidad de las Americas in Puebla, Mexico.
and complemented my vision of risk in the company.
I started working at Deloitte Mexico while studying
Also, my time at this company holds special
at university. Combining these two activities was
significance to me because I met my husband there.
a big challenge because both required significant
Subsequently, I applied for the position of business
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
information security officer (BISO) at Citi, one of the
I am certified in PECB ISO/IEC 27001 and ISO 22301
biggest banks in Mexico and the world. After almost
and I am pursuing an ISACA certification (CSIM). I am
three years I was promoted to senior information
convinced it is important to develop technical skills
security officer. In this position my responsibilities are:
in security, but most important are communication and management skills, because you have to make
• ensuring security practices/standards compliance and reducing security risks through enhancing
people aware of all the threats we are exposed to in cyberspace and in our everyday lives.
controls and minimising weaknesses in Citi’s applications portfolio.
Prior to joining Citi I had mostly worked in areas
• ensuring audits are passed with a satisfactory
where men were in the majority. However, I am
audit rating for all information security topics.
pleased to say almost half the employees in Citi’s
• supporting development and implementation
information security area are women. This indicates
in Mexico of Citi’s global information security
women are becoming increasingly relevant in
policies, standards and initiatives.
information security.
• providing recommendations on the information security aspects of projects and assessing/
My future plans are to continue in the cybersecurity
reporting on corrective actions plans to improve
and information security area. I aspire to be a CISO in
information security programs and initiatives.
a global company. I am willing to relocate to another country, to learn more about another culture, get
DISCOVERING THE FINANCE SECTOR
to know more people and increase my cultural and
I was reluctant to work in a company in the financial
technical skills. In my free time I like to read historical
sector, but now I work in a bank, I realise my
novels, thrillers and any kind of reading that helps
reluctance was misguided. I have learned so much
clear my mind. Also, I love cooking and baking. I like
about all the regulations that must be complied
to experiment with ingredients to create new recipes
with, locally and globally. Without a doubt the
and new tastes.
financial sector is the most regulated in terms of information security. www.linkedin.com/in/maría-teresa-jiménez-salinas-a4966320
Congratulations to all the 2023 New Zealand Women in Security Award Winners
www.womeninsecurityawards.co.nz
I S S U E 18
WOMEN IN SECURITY MAGAZINE
25
Natasha Towner Deputy CISO and Security Operations Lead
N
atasha Towner is deputy CISO and
starting her first job as a quality assurance tester for
security operations lead for the Francis
a payment provider, Commidea. It was there that she
Crick Institute (the Crick). She has been
discovered cybersecurity.
in the role for nearly six months. “My role embraces a range of cybersecurity
FROM QA TO CYBERSECURITY
and data protection functions including leading the
“Following a short time in quality assurance I took on
SOC team and using various security tools,” she
the role of cybersecurity analyst. I learnt to become a
says. “The SOC team is instrumental in ensuring the
cybersecurity analyst from my manager and mentor,
continuing security of the Crick.
Marc White, and this has been my career over the past 13 years,” she says. “He taught me everything
“My day-to-day activities vary. They can include
around cybersecurity! Following Commidea, I worked
reviewing our security status using SOC
at Vanquis Bank and at Optomany where I progressed
tooling, reviewing threats and trends within the
from senior cybersecurity analyst to information
pharmaceutical and research landscape, reviewing
security manager.
the Crick’s cybersecurity tools, processes and other aspects of its security.”
“I am very lucky to have an extremely strong support system. Although cyber security generally is a male
Towner says working at the Crick is very rewarding.
dominated sector to work in. I have always been very
“It is the UK’s biggest biomedical research facility. Its
lucky enough to work with male counterparts without
main function is to find cures for various diseases,
any sexism or misogyny. I have always been treated
including cancer. Being part of an organisation that
as an equal. Within the Francis Crick the Architecture
is trying to help find cures for diseases that affect
and Design and Information Security team is led by
almost every family is inspiring.”
Minu Ali and I have learnt a lot from Minu in the past six months, and continue to do so in the future.”
After completing her A-levels at Chapter School for
26
Girls, where she studied IT and Law and then forensic
However, Towner says the most important people to
computing at the University of the West of England
her career success have been those in her family, first
(UWE), graduating in 2010 with a 2:1 degree and
and foremost her husband, closely followed by her
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
parents. “My husband Christian Towner has always
Towner holds ISACA professional membership, and
been my biggest supporter and has encouraged me at
is a member of the London chapter. “The journal
every opportunity in my career,” she says. “My parents
published by ISACA is a very useful tool and keeps me
Paul and Tracy, sister Amy and close friend Sarah
updated on new threads and trends in cybersecurity,”
have also always listened and encouraged me to be
she says.
my best” “My further plans include completing my CISSP She has also continued with formal learning since
qualification, mentoring other employees at the Crick
graduating, taking courses on SIEM and rule
and building the profile of cybersecurity. I would like
generation and PCI DSS, along with general online
to further my skills by completing other recognised
courses to learn more about current threats. She
courses. I hope to learn a lot more from my role
has also completed ISACA’s Certified Information
as deputy CISO at the Crick and extend my skills
Security Auditor course. “In all my roles the skills I
and knowledge.”
learnt from my degree and the CISA course have been instrumental in establishing security as a program and setting the basic security framework,” she says.
www.linkedin.com/in/natasha-towner-7260a8218
And Towner has not stopped learning. In 2024 she plans to complete the CISSP course and attend the Hershel Programme for Women in Technical Leadership course. She recently received a Top 100 Future CISO award from Hot Topics.
NEW ZEALAND WOMEN IN SECURITY AWARDS 2023
I S S U E 18
Thank you to our sponsors WOMEN IN SECURITY MAGAZINE
27
D O Y O U W ANT TO HEL P UP LI FT WO M E N I N CY BER SECU RIT Y?
S P ON S O R S W E LC OM E D
TA N G IB L E UPL IFT PR OG RA M I F YO U ' R E I N T E RE S TE D I N S P ON SO RIN G TU P , P LE A S E ME S SA GE US O N L IN KE DI N. l in k edi n.c om /com pany/ta ng ibl e-up lift-p ro gra m
Big Picture Easy Reliable No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY!
charlie@source2create.com.au
aby@source2create.com.au
Ayça Güzünler Director of Security, Strategic Programs & Business Operations at Booking.com
W
hen Ayça Güzünler talks about
become the person I am without those learnings. So I
her experience of gender
would not change anything even if I could.”
discrimination she is not one to mince words. “I wish I had
FACILITIES BASED DISCRIMINATION
nothing to mention here. But we all
At university Güzünler faced a different kind of gender
probably have that one person who single-handedly
discrimination: ‘facilities-based discrimination’. “I kept
turned our life to shit for a period, right?”
complaining to the faculty dean about the number of female bathrooms versus male bathrooms in the
That one person was: “The worst manager of
buildings, presenting data on how much we needed to
my entire life, a CSO I reported to for a while. He
walk (sometimes run) in the breaks or during classes/
presented me with roadblocks that caused me not
labs if we needed to pee,” she says.
only career challenges and people challenges but also health challenges. He was, and probably still is, a
“It sounds simple, I know. But doing that long walk
misogynistic person who enjoyed using women to his
to another floor for four years a few times every day
advantage for personal success, yet never gave them
takes a toll on a young person’s mind, and makes
what they deserved.
them feel unwelcome.”
“He blocked multiple female leaders’ growth. He
That was in Güzünler’s native Türkiye, a country as
would give women zero salary raise while others
we noted in another What’s her Journey? in this issue
would enjoy ten to fifteen percent on a yearly basis.
(that of Elif Cansu Güleç) ranked as one of the worst
He would cut the female leaders’ bonus or other
in the world for gender discrimination.
benefits. He would crucify the mistakes of women while protecting his mates who happen to be same
Güzünler has come a long way since her student
gender. He was the exact opposite of a champion.”
days. She is now director of security, strategic programs and business operations at Booking.com
30
However, Güzünler says there were positive outcomes
in Amsterdam. She has been with the company
from this experience. “I learned a great deal from
since 2019, moving from Vodafone, also in
this awful man. And looking back, I would not have
the Netherlands.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
“Our team is made up of four pillars, and the scope
Güzünler’s career journey has been aided significantly
is end to end ranging from strategy to delivery,” she
by some champions. After Vodafone in Türkiye
says. “The Strategy Pillar defines the WHY and WHAT
experienced major natural disasters—a flood and
of our security strategy. We formulate the security
an earthquake—it decided to gain ISO22301 and
strategy together with leadership and manage the
ISO27001 certifications.
planning lifecycles using agile methodologies. This entails getting alignment across the organisation on a
“This is when the CSO of Vodafone, Mesut Demirbilek,
high-level execution plan, creating business cases and
became aware of me,” she says. “He not only saw
challenging the strategy where needed with business
the outcome of the tech team’s efforts leading the
and portfolio leads.
network and IT front to help deliver the strategic goal, he saw me as a young talent. He became my
“The BizOps Pillar operationalises the WHAT, helping
champion. I did not know back then the difference
the portfolios on security budget planning, resource
between a mentor, sponsor or champion. I learned
planning and data insights. Through this governance
through experience that a champion is someone
pillar we challenge the target setting process so it is
who makes things happen for you. Mesut Demirbilek
aligned with strategy, yet still sufficiently ambitious.
got me into situations where I would meet amazing people in the industry, leaders and pioneers who each
“The Program Management Pillar delivers the WHAT
opened doors for me. He is still my go-to person for
together with portfolio teams, governing the execution
any kind of life or career decision.
and dependencies continuously through programs or projects which have a start and end date. This pillar is
“What women really need is what men get all the
the connective glue that enable complex initiatives or
time: someone prepared to go out on a limb for them.
projects and transitions to be successful.
A champion is someone who, behind closed doors, slams their fist on the table and says: ‘if there is only
“The Transformation Pillar guides the HOW. We
room for one promotion on the budget, it will be her’.
anticipate the employee impact and concerns of any
In other words, a champion is a committed sponsor
security development or transformation project. Then
who has the agency to influence people at the top
we equip the portfolios with the necessary tools and
and will use it to help you. Someone who will be your
knowledge so we can achieve sustainable change.
brand ambassador and push you to get ahead.”
This pillar is the key to engaging and working with our change partners to find common ground for all
BEING CHAMPIONED
stakeholders with the end goal in mind: advancing
Another champion who played a pivotal role in
cybersecurity and privacy as a common good across
Güzünler’s career was Andrew Sterneberg, in
our organisation.”
2009 corporate security officer at Vodafone in the Netherlands. “Andrew offered me the chance to move
FROM ISTANBUL TO AMSTERDAM
from one continent to another with a challenging
After graduating from Türkiye’s Hacettepe University
but cool job in the Netherlands,” Güzünler says. “The
with a bachelor’s in electrical and electronics
role was a double promotion for me and a huge leap
engineering Güzünler joined Vodafone in Istanbul in
in income. Andrew, back then, was advised by other
2005 and stayed there until 2011 when she moved
sponsors I had: security leaders I worked with in
to Vodafone in Amsterdam, along the way gaining a
Germany, Ingo Geisler and in UK, Nikolaos Loukeris.”
masters in engineering and technology management from Türkiye’s Boğaziçi University in 2009. After four
She also pays tribute to “fearless and inspirational
years with Vodafone in Amsterdam—which became
female leader, Barbara Jongerden, chief legal officer
VodafoneZiggo in 2017—she joined Booking.com
of VodafoneZiggo. “Never in my life or career have
in 2019.
I found someone as accepting and forgiving as
I S S U E 18
WOMEN IN SECURITY MAGAZINE
31
she was,” Güzünler says. “I worked with her in my
inappropriate behaviour, or those who have reached
30s and at a time when I tried new things. I made
their position only because they were part of the right
mistakes. She provided me the opportunity of failing
bunch of other white men.
and learning. “When I get an invitation for an event, out of “Another thing she did was to expand my role and
curiousity, I check the names or photos provided on
responsibilities right after I had a baby and came
the list, to be reminded again of the inequality. Let’s
back from maternity leave. In a male dominated
face it, we are ‘still’ underrepresented, and the trend
environment, unfortunately it works the other way
is not improving at the pace needed. It results in a
around. Usually we come back from parental leave or
number of problems, but most importantly the lack of
any kind of long term leave to find our team has been
psychological safety for women in security. I do not
shrunk or distributed to other managers. Barbara’s
want to generalise. I am sure there are companies
trust and dedication to female team members have
doing a great job, lifting women as they go. However,
been absolutely amazing to experience and I am
for most, it is not the case. Psychological safety and
grateful to her for being a great role model, helping
the right kind of visibility are critical for any kind of
me find my voice.”
career growth and personal growth.”
She continues to be blessed with good leaders,
And Güzünler's plan for her next phase of growth is
singing the praises of Booking.com CTO Rob Francis.
another masters: “My aspirations lie in the domain of
“He is incredibly humble and does not like to hear too
environmental, social, and corporate governance,” she
many compliments, but I find him to be the smartest
says. “I find great purpose and admiration of people
and most grounded Tech leader I ever had, who is
who deal with global risks and the deadly challenges
fully dedicated to the future and improvement of
humankind is facing.
tech teams, including the growth of female leaders operating under him.”
“Therefore, I have decided to take up another masters program from Amsterdam University and be part of
STILL FACING SEXISM
their ESG academy. I am super excited to grow in this
Güzünler has come a long way after almost two
direction and use my governance experience and risk
decades in IT and cybersecurity but says the gender
management knowhow for improving the world my
imbalance and sexism continue to trouble her. “The
children and, hopefully, their children will live in.”
rare moments of doubt where I think I might have taken a wrong turn are when I feel overwhelmed by the dominance of average men in leadership with
32
W O M E N I N S E C U R I T Y M A G A Z I N E
www.linkedin.com/in/ayca-m-19962713
J A N U A RY • F E B R U A RY 2024
LIVING THE DREAM “I planned to continue my own studies in parallel at the same university by way of a Master’s degree in Translation and Generative Grammar,” she explains. “It
Colette Hanley Vice President, Technology Risk at Checkout.com
I
turned out the only place I could just about afford to live in was a dank top floor apartment in the 18th district of Paris. But it was just around the corner from the Moulin Rouge, so I was pretty much living the dream, despite the semi-permanent cockroach infestation.” She admits to being initially out of her depth as a teacher, but says the skills she gained to cope in the
f you check out Colette Hanley’s LinkedIn profile
classroom prepared her for some aspects of her
you will see a list of impressive security roles with
future career in cyber. “I had to think hard about my
global organisations stretching back two decades:
ability to engage effectively with people, and also
from information security compliance manager at
how to move from theory to practise. Not getting it
PWC to her current role of VP technology risk with
right the first time, or the second and the third, was a
Checkout.com (a global company providing online
lesson in how persistence drives incremental change.
payment services) and embracing Barclays Bank (head
It didn’t matter how expert I was in my subject
of standards and compliance), Betfair (global head of
matter, it’s the quality of the communication and the
compliance security), Skype (global head of information
relationship that most affected the outcome.”
security compliance), a similar role at Microsoft after it bought Skype and Nokia (chief privacy officer).
Hanley gained her master’s and France’s Certificate of Aptitude for Secondary School Teachers (CAPES)
What you won’t find is any reference to her earlier,
qualifying her to teach in the French education
very different roles.
system. A few years later she returned to England, took contract work translating French texts and a
“My first loves were language, fine art and ideas,”
variety of jobs. It was at one such—office admin
she says. “I have a degree in French and Italian from
at a hedge fund—that Hanley first encountered
the University of Exeter in South West England. … I
cybersecurity.
was interested in how we tell stories, describe our world and our human experience, how we make a
“I was handed responsibility for managing their
connection and articulate ideas. My special focus
backups. In getting to grips with what backups were
was exploring the relationships between art, society
and why they’re important, I lifted the lid on a universe
and literature and the influence they have on each
dedicated to protecting information. I read up a bit
other. I was also absorbed by the works of the
more on the concepts and then the details.”
French philosophers because they taught me how to challenge my own assumptions, how to organise
STEGANOGRAPHY
ideas about fundamental yet illusive concepts such as
Steganography piqued her interest. “Steganography
existence and ethics.”
and its origins fascinated me since, as far as I was concerned, it was all about hiding meaning in plain
Her first job after graduating was as a lecturer in
sight, reminding me of the literary texts I’d analysed
grammar, linguistics and the ‘conventions of the short
as an undergrad,” she says. She was rather bemused
story’ at l’Université Paris Nanterre on the outskirts
by public key cryptography, saying it “genuinely felt
of Paris.
like an Absurdist experiment.”
I S S U E 18
WOMEN IN SECURITY MAGAZINE
33
Nonetheless, Hanley was sufficiently motived to make
A DELICATE BALANCE
a massive commitment to cybersecurity: she resigned
Some of her transitions have not been easy, or
her job and used her savings to put herself through
seemed wise at the time. In particular, moving from a
a Master’s in Information Security at Royal Holloway,
well-established bank to a tech startup. “I found I had
University of London, where the ‘Absurdist experiment’
a delicate balance to strike when layering governance
of cryptography could not be avoided. “Unsurprisingly,
and compliance onto this pretty chaotic environment
the first term at RHUL was hard work. Not having a
and without slowing any of the engineers down,”
degree in mathematics meant attending extra maths
Hanley says.
lessons to cope with the cryptography module,” Hanley says.
“I was used to security compliance being driven by mandate which wasn’t the case here. I had to
She was extremely fortunate to be taught
adapt my approach and properly engage with my
cryptography by one of the best. “I had an incredible
stakeholders by asking really good questions and
teacher: the security visionary professor Fred Piper
listening with intent. It was helpful for both parties.
who developed the first cryptography research group
Security might be top of my list but it’s not realistic to
in UK higher education,” Hanley says. “Thanks to him, I
think that my colleagues feel the same. I needed to
aced my crypto exams. I actually have his publication
‘speak their language’ rather than impose mine, then
Cryptography: A Very Short Introduction here on the
join the dots between what I’m asking and what that
shelf behind me!”
means for them. I suppose this is also a reminder of the value of empathy; we’re complex beings and the
Hanley’s formal cyber education did not stop with her
workplace can be really stressful. So let’s keep that in
master’s. She went on to gain a variety of security
mind when we ask people to do stuff.”
and privacy certifications, including CISSP, CISM, CIPM and CDPSE. She says industry certifications
Becoming chief privacy officer at Nokia was another
are important because they provide evidence of a
challenge: the enforcement deadline for the European
baseline of proficiency in a domain, but for the most
Union’s General Data Protection Regulation (GDPR)
part, curiosity still drives her education.
was looming.
“If I stand still, I risk getting stuck and learning moves
“I was charged with operationalising privacy
me forward. It’s healthy for my intellect and good for
requirements across products, services and their
my happiness. Informal opportunities for learning are
200,000 strong workforce, Hanley says. “Building up
rewarding too, such as hearing from industry peers
a function to juggle the regulatory, operational and
how they’re tackling the same challenges I face. Every
business aspects of privacy implementation was
book I open and every person I interact with has the
heavy lifting but completely engrossing.
potential to expand my universe. That’s exhilarating.” “I got to work with some wonderful people: my team, Looking back on her cybersecurity career to date
the privacy officers across the business and some
Hanley says each step has been carefully considered.
talented legal counsel. This network of allies directly
“Keeping an open mind has worked well for me and
influenced performance and outcome for privacy at
allowed me to recognise opportunities when they
Nokia and helped me devise creative approaches
arise. Over the years, I’ve learnt more about what’s
to addressing obstacles and opportunities. When
important for me; I want to be somewhere I’ll add
everyone is invested in collective success, you can
value, where I can try new things, be intellectually
face anything.”
stimulated and have fun.”
34
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
After five years at Nokia Hanley took on her current
“I may also be involved in discussions about our
role at Checkout.com covering technology risk
security posture with our merchants or regulators.
oversight, security compliance, security assurance
The fragmentation of requirements we’ve witnessed
and data governance.
in the world of privacy is definitely spreading to cybersecurity. Regionalisation and localisation of
“My role is to protect our products, services and
compliance requirements means the ecosystem is
operations, maintain our security compliance
becoming ever more complex to navigate. We’re a
obligations, and provide security assurance to our
fast-moving business so ‘expect the unexpected’
merchants and regulators,” she says. “I enjoy the
is par for the course and our security governance
variety and impact of my work, as well as the chance
must be flexible enough to cope with new needs.
to learn and innovate in a fast-paced environment.
For example, if the business decides to move into a new market, we quickly get to grips with the relevant
A NEW CHALLENGE
regulation and compliance requirements and analyse
“Checkout.com provides payment solutions for
the operational impact.”
businesses and their customers. As a sector, financial services is a prime target for cybersecurity
Outside her role at Checkout.com Hanley says she
attacks. My challenge is to protect our merchants,
believes it to be important to contribute to initiatives
make our business more resilient, manage security
that move the security industry forward. She
compliance for existing and emerging regulation in
participated in the 2023 Cyber Innovation Challenge
a dynamic threat landscape. I also need to make it
run by the City of London.
easy for everyone in the company to understand the link between information security and our company
“A range of financial institutions, tech vendors and
objectives and shape the mindset, behaviours and
the Metropolitan Police came together to tackle an
values of our workforce to create a positive security
industry-specific conundrum around sharing threat
culture. A security leader is a business leader; we
intelligence without compromising internal information
need to align security to the business and not the
or compliance,” she explains. “My contribution was
other way round. This is how we make security
to challenge the tech vendors to make their offerings
relevant and valuable.
robust from a privacy and security compliance perspective as well as defensible to senior leadership
“I’ve enjoyed seeing the positive impact my team has
and customers. Working with such a range of the
had. People are involving us early in their planning
participants but for the good of all was amazing. We
recognising that delivering a quality product means
definitely made ourselves stronger together.”
embedding security from the start. We’ve gained a seat at the table by partnering to understand the
Cybersecurity is Hanley’s third career after teacher
hurdles they face when implementing our governance,
and translator and while it might seem very different,
risk and compliance requirements. We engage
she sees important similarities. “I started out caring
regularly, are pragmatic with our guidance and are
about language, communication and relationships
ready to present options which achieve better results
and I still care about those today. As Bruce Schneier
for everyone.”
put it, ‘If you think technology can solve your security problems, then you don’t understand the problems
She says her day inevitably features activities that
and you don’t understand the technology.’ For me, it’s
contribute to maintaining strong data governance,
all about people.”
embedding security principles, overseeing compliance work and facilitating assurance with security and data protection regulations.
I S S U E 18
www.linkedin.com/in/colette-hanley
WOMEN IN SECURITY MAGAZINE
35
Marina Gistau CEO Nudgy Consulting | Change Manager Cybersecurity
M
y name is Marina Gistau. I am
My mission at that time was to assist the managers
the CEO and founder of Nudgy
of the final assembly line to offer client airlines a
Consulting, and a change manager
process and an action plan to build a better customer
in cybersecurity. A few years ago I
experience. Clients often visit aircraft factories to
would never have imagined having
monitor the construction of their planes, report
such a job title, or such expertise. Let me take you
non-conformities, track progress, etc. It was a real
through the key moments in my journey to gaining
challenge for me, at the intersection of two worlds.
expertise in cybersecurity and organisational change.
On the one hand, clients and investors expected an exemplary level of quality throughout the purchasing
As far back as I can remember, I have been
and design process. On the other, the teams close to
passionate about advertising. More specifically, about
the industrial processes in the factory, and closely
the concepts used in advertising to evoke emotion,
connected to the product, were not very receptive to
influence action and so on. I loved spending time
clients’ sensitivity.
analysing billboards or TV ads and wondering how one slogan could have been better than another, or
The challenge was colossal, but the experience
what story I would have wanted to tell if I had been in
reinforced my conviction that humans are at the heart
their place. So, it was quite natural for me to pursue
of any change. It created in me a certain fascination
my studies in a business school in France, specifically
for what is now called ‘change management’: guiding
the Toulouse Business School.
individuals from state A to state B, accompanying them through a multitude of steps and ensuring
FROM MARKETING TO THE AEROSPACE INDUSTRY
they arrive at their destination under the best possible conditions.
After completing my master’s in marketing and
36
communication an unexpected opportunity presented
THE TURNING POINT: CYBERSECURITY
itself: a mission in the aerospace industry. A sector
After this project had been completed I was
that had never really interested me. Nevertheless,
approached to take on a new mission. That was when
being naturally (perhaps too) curious, I wanted
cybersecurity came to me. At the time we called
to give it a try. There, I discovered a certain
it ‘information security awareness’. The goal was
rigour, unwavering technological demands and,
ambitious: to develop a cybersecurity culture and
above all, passionate colleagues united around a
reduce risks in a group of 130,000 users worldwide,
product: airplanes.
across all entities. Quite a challenge when you do not
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
know much about cybersecurity. That was eight years
shift the boundaries and raise awareness, which
ago. My curiosity was one of the main factors in my
is not always easy in such a large group and with
success. At the beginning of this mission I educated
a communication department very cautious about
myself and enriched my knowledge, day after day
this type of action for end users. But when you have
(for a long time) with videos and podcasts about the
convictions, you have to go all the way, and that
world of cybersecurity: the stakes, the challenges,
is what I did. I produced impactful content for this
the evolution of the sector. At the same time, I used
client: a six episode video saga, a mini-series aimed
my expertise in change management to implement a
at raising awareness of best practices. I initiated
tailor-made strategy in line with my client’s context.
a big change in cybersecurity practices without being alarmist.
It was an adaptation of the Transtheoretical Model of Change. This model evolved through studies
In collaboration with a production agency we
examining the experiences of smokers trying to
imagined, designed and shot these episodes. They
quit. It posits that individuals move through six
were, at the time, very disruptive in tone and in terms
stages of change: precontemplation, contemplation,
of cybersecurity awareness. One challenge was to
preparation, action, maintenance and termination.
convince my client that this campaign—a risk in tone and approach, but a measured one—would make a
This model was the cornerstone of my approach
significant contribution towards the achievement of
during my three years of intervention. Cybersecurity
our transformation and behaviour evolution goals.
may seem highly technical, boring or reserved for
This campaign became a source of pride because
geeks. Not at all. It’s a fascinating field, partly because
it took us to the Corporate Film Festival in Cannes
it impacts all of us every day in our professional and
in 2015 where it won a Gold Dolphin, the highest
personal lives. Our digital lives are so important today
distinction in the human resources category.
that cybersecurity concerns us all, and we must be aware of it.
This achievement made me realise I had a card to play, and above all a voice and a vision for creating
CHANGING BEHAVIOUR TO ENHANCE SECURITY
awareness on this subject. After more than three
My first approach in implementing this strategy
I left the world of cybersecurity to get closer to IT.
was to ask myself “why is it so difficult to change
Today I am helping this same aerospace group
behaviours in terms of cybersecurity? Why isn’t a
transition from Microsoft 365 solutions to Google
known good behaviour always adopted?” I returned to
Workspace, and I continue to develop human-
my guiding principle: the human! You cannot influence
centred support concepts that resonate with me:
a person’s behaviour by simply telling them what to
implementation of a global champions network,
do; the change process is very complex. Applied to
development of corners, a plan for business
cybersecurity, it is even more so, because we often
usage transition.
years with this client, and with a twinge in my heart,
see only the consequences of bad behaviours after the event, or sometimes never. For example, the
After more than two years I felt the need to specialise
hacking of one’s online account can occur long after
in a key aspect of change management: training. I
a data breach, and it is possible to compromise a
also wanted to discover different and smaller clients.
system by clicking on a malicious email without every
So, in 2019, I joined a small company. With this
knowing the consequences of that action.
company I quickly gained expertise in next-generation training concepts, the most effective learning
I spent a lot of time studying behaviours,
methods and pedagogical coherence: the alignment
cybersecurity risks and consequences. I wanted to
of learning standards and teaching.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
37
NUDGY CONSULTING - A DREAM COME TRUE
few months after creating my company a former
I had kept in the back of my mind for years what
colleague and friend contacted me and told me she
I called a ‘gentle dream’: “One day (when I’m a big
needed a profile of her current project and that I
girl) I would like to have my own company and offer
would be the right person to produce it. Guess what? I
my clients approaches and concepts that resonate
was being offered work on an ambitious cybersecurity
with me,” all while thinking to myself it would
awareness project in a large logistics group based in
probably never happen. As a woman, I believe we
the South of France.
too often suffer from the impostor syndrome. We do not trust ourselves sufficiently and we always
Of course, I accepted. And for more than two years
wonder if we have the legitimacy to act, especially
I’ve been assisting this organisation on various
in the professional world. I always told myself that
strategic axes of cybersecurity. It is a very new
developing my own company was really what I
environment in which everything is to be built,
wanted and that I had expertise to offer. However, I
and one with a recently formed and young team.
always wondered, do I really make a difference? Am I
I have to make them aware of best practices and
legitimate? Do I have enough expertise?
support cybersecurity projects on the human and business side. This includes working hand in hand
If you’re asking yourself these questions, it means the
with technical teams like security operations and
answer is YES! For me, 2021 was the turning point.
enterprise directory to deploy security solutions to
The COVID-19 crisis came and went and the world
the group’s employees. I am also involved in the
was transformed. Everyone thought it was the wrong
cybersecurity crisis communication process with
time, but I felt it was the right time. I dived in, and
employees and partners, working hand in hand with
created my company, Nudgy Consulting. I wanted to
the group’s external communication team.
continue offering consulting services applying global change management practices to cybersecurity
DAILY CHALLENGES
challenges. Why Nudgy? Because I’m very receptive
My daily challenges are mainly trying to get technical
and sensitive to the concept of the nudge, which I find
teams to understand end users’ perspectives and
remarkably effective in change management.
get them to understand that all the changes they make can disrupt users, business continuity, etc. For
I realised my former mission in cybersecurity
example, security tools to filter emails are necessary,
awareness that lasted more than three years was
of course, but must be introduced without disrupting
the most significant of my career, and also the one
critical jobs. This requires significant training to bridge
that pushed me to push my limits, both technically
the gap between technical and functional roles.
and creatively. There is so much to do and provide to users on this subject that I want to go further. A
Another challenge is that the communication departments of large companies are not sufficiently sensitised to the importance of cybersecurity and, unfortunately, do not prioritise it when targeting messages to end users. It is always difficult to get visibility for cybersecurity on internal communication channels. This is regrettable. Cybersecurity often gains attention when it’s too late and a breach has been identified. What I love about my daily life is the unexpected. Every day is different because cybersecurity is unpredictable: you must be agile. Even on my busy
38
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
days, I always allocate at least an hour to monitoring
needs and daily routines. It’s an ongoing exploration
cybersecurity news and trends, to be aware of
to discover and rediscover the specific business
developments elsewhere in the world.
contexts of the companies we aim to integrate. Understanding their habits, processes, and identifying
I also participate in the design and implementation
ways to secure precise elements of their daily
of many initiatives to raise cybersecurity awareness.
operations is crucial. I’ve encountered instances
These include infographics, poster campaigns and
where companies exhibit somewhat unconventional
writing articles for internal channels. My days are also
cybersecurity practices within their business
punctuated by my exchanges with technical teams,
operations, such as heavy reliance on USB exchanges.
the security operations centre (SOC) and integrated
Surprisingly, these methods were 100% essential due
access management teams. I discuss new solutions
to the nature of the specific acquisition’s industry.
to enable the voices of end users to be heard, and we
Hence, analysing these individual processes, initiating
design workable deployment plans that will preserve
workshops with the respective departments to
business continuity.
comprehend their precise needs becomes imperative.
For nearly a year now, I’ve been leveraging my
Following this, agility comes into play, a quality I
expertise in a new realm of cybersecurity: Mergers
believe cybersecurity must possess to effectively rally
and Acquisitions. In the context of acquiring and
and involve these departments. This agility enables us
integrating new companies, the challenge lies in
to propose alternative processes that not only respect
ensuring that the security measures implemented
the specific business use case but also ensure
do not disrupt end users’ business continuity.
their security.”
Additionally, it’s crucial to guarantee that new collaborators undergo sufficient awareness and
In navigating the complexities of merging different
training to prevent potential security breaches. In my
business cultures and methodologies, it’s crucial to
opinion, merger and acquisitions is not (only) about
strike a balance between security and functionality.
tools, it’s about people!
This involves not just understanding the current landscape but also foreseeing potential future risks
This particular focus allows for an exploration
and evolving alongside the changing dynamics of
of topics spanning cybersecurity solutions, work
the industry. Cybersecurity becomes a key enabler in
methodologies, and even delves into digital
these instances, guiding the integration process while
transformation. We’re delving into highly strategic
preserving the integrity of critical operations.
matters, as the economic stakes are significant. Simultaneously, it’s imperative to remain vigilant to
GOOD VIBRATIONS!
ensure that these advancements don’t adversely
Cybersecurity makes me vibrate (yes, it’s strange
affect everyday operations.”
to say that!), because it is vital to move as fast as technology and digital innovation to be relevant.
When dealing with mergers and acquisitions,
AI, for example, poses new security challenges we
cybersecurity plays a pivotal role in safeguarding
must support users to face, but not reactively. We
the operational flow while embracing innovation.
must anticipate the risks AI can introduce, while
This involves not just technological solutions but
keeping the best of these wonderful technological
also comprehensive training programs to instil a
advancements. For example, I recently used AI tools
security-first mindset among the workforce, thereby
to create a poster campaign aimed at raising user
reinforcing the protective layers against potential
awareness about the need to be vigilant online. This
threats and vulnerabilities. Absolutely love how
campaign is impactful and a bit provocative, but it
cybersecurity can be applied across vastly diverse
leads individuals to question their own practices, and
contexts and industries, each with their own unique
that is what induces change.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
39
My role has evolved in recent months and I work with
it is time to put the human back at the centre of
the teams in charge of mergers and acquisitions
cybersecurity, because the human factor is the first
on the cybersecurity aspects. My role is to analyse
line of defence against security breaches. Not tools,
the current environment of each acquisition from
not technology, but the human. All cybersecurity
a cybersecurity culture perspective and support
professionals must be aware of this, but above all,
its transition into the group by minimising risks
apply this principle every day. That is what I want
and helping newly acquired staff gain skills in
to bring.
cybersecurity practices. Analysing and uniting cultures is now my area of expertise. Because
I am convinced that wherever there is an opportunity
an integration involves people I also intervene on
to do better, there is also an opportunity to do things
the transitioning practices and jobs, aligning their
differently and think outside the box. In cybersecurity,
environment with our security tools. It enriches me
the unexpected rules. Every day I immerse myself in
to understand the ways of working and the needs of
a constantly changing world: AI, innovations: so many
companies that can differ greatly in size or activity.
exciting challenges to anticipate. My job is a perpetual challenge, an inexhaustible source of learning, and
I write articles for the blog on my website, which I
a mission in which we must give the human its
enjoy sharing with my community to give them best
rightful place.
practices and quick wins in security awareness. I take great pleasure in the daily challenges of my job, where I learn as much as I can to offer my clients. In
www.linkedin.com/in/marinagistau
the near future I would like to grow my company with people like myself and further develop my consulting
www.linkedin.com/company/nudgy-consulting
offer in cybersecurity. nudgy-consulting.com
To succeed in a job like mine you have to be creative and (try to) stay ahead. Learn, always. Question yourself and propose new things. Also, I believe
Congratulations to all the 2023 New Zealand Women in Security Awards Highly Commended & Special Recognition honorees
www.womeninsecurityawards.co.nz
40
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Contact us today to find out how you can become an industry contributor, no matter the level of experience. reach out now www.womeninsecuritymagazine.com
correlate international politics and economics with cybersecurity. My education in international relations is set to be completed soon. In my current role, the most critical skills include event planning, project management, communication,
Emilly Ricarte Project and Event Management Specialist
branding, sales strategies, data analysis and process automation. I plan to further develop my skills in artificial intelligence, advanced data analysis, process automation and sales strategy improvement. These skills are essential in an industry that is continually evolving, and especially in cybersecurity.
I
A NON-TRADITIONAL JOURNEY INTO CYBERSECURITY n my current role as a project and event
My journey into cybersecurity was not a traditional
management specialist I work on events in various
one but evolved from a growing personal interest.
sectors, including defence, technology and the
While working on technology and cybersecurity-
non-profit sector. I particularly enjoy exploring the
related events, I began to grasp the critical
intersections between different fields and finding
importance of protecting infrastructure against cyber
ways to add value to corporations and organisations.
threats. I became more involved in cyber through my
However, one of the significant challenges I face is
participation in events like the Brazil Cyber Nexus,
being underestimated by some individuals who may
which exposed me to the latest tools and techniques
not be accustomed to seeing women in leadership
for ensuring cybersecurity in Brazil.
roles in this domain. Overcoming these biases and stereotypes can be demanding, but it only fuels
The turning point in my journey to cybersecurity came
my determination.
when I delved into online content about women’s role in technology. The Google Women Techmakers
A typical day in my role is office-based during
program piqued my interest and made me realise
regular business hours. However, next year we plan
the potential and importance of promoting gender
to transition to a hybrid work model. I founded my
diversity in cybersecurity and technology. This
agency, M2L Consulting and Service, in 2020 and we
inspired me to become more involved in advocating
currently hold a contract with Brazilian institutional
for opportunities for women in the tech and
and government relations firm Prospectare where
cybersecurity sectors.
we collaborate to organise various events through
42
the Tomorrow Forces platform for defence industry
Throughout my cybersecurity journey I faced
exhibitions and demonstrations. I am also a
challenges and moments of self-doubt, especially
participant in Muay Thai (Thai Boxing) and I am a
because of the inherent complexity of the field and
practitioner and service provider within the Muaythai
the prevalence of a male-dominated culture. However,
community, we call it “Nak Muay” which can also be
I persisted in my quest to unravel the mysteries and
Thai Boxing. My career journey has been diverse. It
overcome these challenges. While I encountered
started in international relations, which gave me a
setbacks, my passion for cybersecurity and my
solid foundation for understanding global political
commitment to promoting gender diversity in the field
and economic scenarios and enhanced my ability to
kept me focused.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
W H A T ’ S
H E R
J O U R N E Y ?
I have no regrets about my career changes or job
that guides young people towards cybersecurity
opportunities. I believe every experience, whether
career opportunities. I also organise cybersecurity
challenging or rewarding, contributes to personal
events to facilitate information exchange and the
growth and learning. I embrace the idea that every
sharing of best practice. I serve as a mentor to
experience shapes who we are and prepares
beginners in the field, select speakers for events to
us for future challenges. I see success as being
ensure they address current cybersecurity trends, and
built on a foundation of diverse experiences and
I participate actively in cybersecurity communities.
continuous learning. Looking ahead, I aspire to further my education My mother has always been a significant source of
and keep up with the expected developments
support and encouragement, and my current directors
in cybersecurity. I plan to continue my learning
(Coronel Rogério Gomes da Costa and CEO Heleno
journey to stay up to date on the latest trends
Maffucci) have been instrumental in making all of
and technologies. With the rapid evolution of
this possible. Their commitment to multipotentiality
cybersecurity, it is crucial to remain informed and
and the importance of having a broad perspective
adapt to emerging challenges.
have been influential. They encouraged me to think of my career as a ‘cybernetic radar’ where the ability
Moreover, I aim to expand the scope of our
to understand and navigate various sectors is a
cybersecurity events, applying my project
valuable asset.
management, cybersecurity and emerging technology skills to help organisations address growing
FACING SEXISM AND MISOGYNY
challenges. I view the expected developments in
On the other hand, I have encountered obstacles
cybersecurity as opportunities for innovation and
along the way, such as instances of sexism and
proactive enhancement of security postures.
misogyny. I remember an event where I was mistaken for an escort, and the individual persistently
In summary, my vision is to contribute to building
suggested I could be a great companion. I felt
safer, more resilient environments that can effectively
uncomfortable and ended up staying close to
confront emerging challenges in the cybersecurity
acquaintances to avoid this individual. Today, I would
and project management realms. I am committed
not tolerate such behaviour and would stand up
to acquiring knowledge and experience to achieve
against it, thanks to other women who have been
these goals.
harassed and did not stay silent. Outside of my paid employment I actively contribute
www.linkedin.com/in/emillyricarte
to cybersecurity through a career development hub
I S S U E 18
WOMEN IN SECURITY MAGAZINE
43
CRAIG FORD Head Unicorn – Cofounder and Executive Director, Cyber Unicorns. Australian Best Selling Author of A Hacker I Am, Foresight and The Shadow World book series. vCISO – Hungry Jacks, Wesley Mission, PCYC and Baidam Solutions.
C O L U M N
Breaking stereotypes Those who know me will probably be familiar with my first book: A Hacker I Am. It remains a personal favourite, for several reasons. Firstly, I was taking a leap in publishing a book. It was something I had never aspired too until about a year before 8 September 2019 when it was released. I am now getting ready to publish my sixth book, Vulcan (number three in my Foresight series). I amaze myself when I see how far I have come as a writer in the years since that first book. You won’t see a hooded figure on the cover of A Hacker I Am. Instead you will see a cartoon representation of me; it’s what some hackers looks like. As an ethical hacker (probably not a very talented one, but one nonetheless), I wanted to have that image and that name for my book. I cringe every time I see a hooded hacker used on the news or on books. Look, I get it, the public recognise this depiction: it is one that has been thrown at them at every opportunity since hacking emerged. It is probably
the industry, but when I ask myself if what I am doing
impossible to change that image now, but that is no
sufficient, the answer is NO.
reason for me, a professional in this space, not to pull
44
back the curtain on the hidden world many outside of
Like many of the contributors to Women in Security
our industry would think harbours some kind of dark
magazine, I mentor, I share my stories and I
magic, and show them a hacker could be someone
encourage the next generation of cybersecurity
who looks like me, or like Chris Roberts (a US based
professionals. We all help to ensure the next cohort is
CISO, Ethical Hacker and who I believe is an all-round
open and inclusive no matter the sexual orientation,
great guy) with his amazingly bright coloured beard.
gender, religion or colour of its members. If we
It could also be the girl next door, your daughter
all come together we can withstand the constant
or neighbour.
avalanche of threats that face us.
Stereotyping in any industry creates a false perception
My desire to do something to foster diversity in
we must dispel to reveal the reality. That’s how Sam
cybersecurity led me to create Sam, the girl next door,
(Samantha) the lead character in my Foresight series
the teenage hacker with a hidden life no one around
came about. My aim was to encourage diversity in
her knew about.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I wanted her to break down stereotypes by showing young women that hacking is not just a boy’s club. Many of the amazing hackers and security professionals I look up to, are female. They are truly badass, and I am proud to call them all peers, friends and colleagues. If my Foresight series has encouraged just one more young woman to look at cybersecurity as a career, or one young man to look
dotm.com.au/
up to that character and think “Wow she is awesome” and see her as normal then the Foresight series has been a complete success. It’s about changing minds, helping people understand that stereotypes are not reality. Let’s pull them down. Let’s rebuild what people think is normal. Let’s make room for everyone. No, let’s go out and encourage all
Join Today for FREE
To NETWORK with other like-minded people
different kinds of individuals to take a look, see what the industry has to offer. We will all benefit from a real shift, a real breakdown of the stereotypes. Go do everything you can, help me. Write a book, article, mentor, find something that works for you.
To MEET prospective candidates for graduate programs
Just do something. www.linkedin.com/in/craig-ford-cybersecurity
www.facebook.com/AHackerIam
To MEET prospective employers of graduate programs
www.instagram.com/ahackeriam
twitter.com/CraigFord_Cyber
www.cyberunicorns.com.au
I S S U E 18
The club is for security professionals (present, future and past)
WOMEN IN SECURITY MAGAZINE
45
KAREN STEPHENS Karen Stephens is the co-founder and CEO of BCyber. After more than 25 years in financial services, Karen moved into SME cybersecurity risk management. She works with SMEs to protect and grow their businesses by demystifying the technical aspects of cybersecurity and helping them to identify and address cybersecurity and governance risk gaps. She was recently named inaugural Female Cyber Leader of the Year at the 2023 CyberSecurity Connect Awards in Canberra.
C O L U M N
On the edge of innovation: breaking boundaries in 2024 by learning from 2023 I don’t know about you, but for me 2023 has been
staff working in a culture of “don’t ask, don’t tell” when
a year of extreme highs and lows, I would describe
they click on a bad link.
as ‘character building’. I am definitely in the ‘let’s learn from it’ club, so it’s time to reflect on key 2023
The July/August edition (p58) Focussed on
‘boundary breaking’ themes, taking what we can from
empowering the over 50 percent of Australians who
them into 2024 to make it bigger, better and brighter
are largely ignored and yet usually impacted the most
than 2023.
by cyber breaches: the SMEs, school children and retirees. Not a day goes by when the mainstream
I invite you to take a moment and join me, as I revisit
press does not wheel out some horror story, or
this column’s themes in 2023.
talkback radio show discusses how clicking on a bad link ruined someone’s life. Let’s make 2024 the
The March/April edition (p66) Shone a spotlight on
year we bring cyber awareness to all: throughout
the strength that diversity can bring to cybersecurity.
the year, not only in October, the designated Cyber
Diversity of experience is key to a thriving
Awareness Month.
cybersecurity ecosystem, and we can all play our part. For example, you can continue to look beyond the
The September/October edition (p84) Was all about
traditional employee candidates. What about those
personal growth. I urged readers to focus on ‘outside
who have great communication skills and can learn
the box’ activities: networking, allies, micro courses.
the tech skills? (The latter are easier for people to
What did you do? If the answer is “Not much, I got
learn than the former, trust me on this). Or step out of
busy,” with New Year right around the corner, it will
your comfort zone and make yourself approachable
soon be time for resolutions.
and available to those entering the industry. After all, you can never have too much coffee in your life!
Make 2024 your time for doing, and not just for making resolutions! In the words of Winston Churchill:
The May/June edition (p64) Reconfirmed
“Those who fail to learn from history are doomed to
that cybersecurity is not just a tech problem.
repeat it”. Let’s not be those people in 2024!
Communicating this fact is a never-ending battle. I feel I have been saying this ever since I joined
May you and yours have a cyber-safe festive season
the cybersecurity industry, and feared no one was
with 2024 bringing only peace, joy, and happiness.
listening. But I am rather excited to say I am now seeing green shoots of progress. Recently, I have noticed heads of risk, governance and compliance starting to raise the “what are we doing about cybersecurity topic?” A risk-centred approach is gaining traction! Remember: the best security software can be easily undone if you have uneducated
46
W O M E N I N S E C U R I T Y M A G A Z I N E
www.linkedin.com/in/karen-stephens-bcyber
www.bcyber.com.au
twitter.com/bcyber2
karen@bcyber.com.au
youtube.bcyber.com.au/2mux
J A N U A RY • F E B R U A RY 2024
INDUSTRY PERSPECTIVES
NEHA DHYANI
ANJALI VARGHESE
CYBER-READY BOARDROOM: BLUEPRINT FOR SUCCESS by Neha Dhyani, Cyber Security Expert (CISSP, CCSP, CISM, MITRE ATT&CK Certified Defender) Senior Security Consultant at Nokia Solutions & Networks Anjali Varghese, Cyber Security Specialist (CISA, CISM, ISO 27001 Lead Implementer) Cyber Security Specialist, Grant Thornton
It is December 2023, a big day for CISO Greg House.
a cyber risk; don’t deal with issues when they’re
“There’s going to be tough discussions with bold
highlighted; or don’t want to address what they
decisions to be made,” Greg says to himself as he
don’t know. Sadly, this approach is an increasingly
prepares his final notes for a board meeting starting
dangerous way to manage cyber risk. The reality is
in two hours. Greg is recently appointed as the CISO
that most corporate boards and C-suite executives do
to an organisation that had suffered a massive data
not have significant cyber experience or expertise to
breach a year earlier. Greg compiles the statistics,
understand and appreciate Greg’s presentation.
the report and the findings into a final presentation that highlights the facts the board will neither like
Adding fuel to the fire is the deficiency of curated
nor appreciate. Right before the board meeting, Greg
interactions of Board with CISOs. The result is that
receives a phone call from CEO Lisa Cuddy wanting
all too often, executives are not optimally informed.
a quick catchup. Greg is surprised and rushes
According to a Wall Street Journal report, only 2.3
quickly to Lisa’s office and enters the room with his
percent of directors at S&P 500 companies have
heart pounding.
cyber experience. The amount of cybersecurity expertise on boards remains relatively low at a
His story will resonate with many cyber executives,
time when boards are under increased scrutiny for
because they experience these emotions quite often.
security failings.
Greg’s presentation stops in its tracks when the
48
Board adopts ‘See No Evil, Hear No Evil, Speak No
Let us dig deep into the challenges and key
Evil’ mindset - where either they don’t believe there’s
considerations that enable the board and the
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
CISO to have an effective blueprint for cyber risk management.
• Stringent security regulations, compliance and liabilities. The updated Security of Critical Infrastructure (SOCI) Act, the Australian Signals
KEY CHALLENGES TO MANAGING CYBER RISK:
Directorate’s Essential 8, the Information Security
• Cybersecurity is a business risk. Boards must
Manual and the telecommunication sector
understand that cybersecurity is a business risk
security reforms for telcos are some of the
they must manage, ensuring proper mitigation
mandatory regulatory obligations to which boards
strategies are in place. • Building cyber resilience is a priority. With ever-
must ensure strict compliance. • New business models, ecosystems and
increasing cyber-attacks, one thing is clear: it is
technologies. With massive digital transformation,
not a question of IF a cyber-attack will occur, it is
cloud adoption and industry 4.0 (OT and IT
a question of WHEN. Hence, every organisation
convergence) all offering increased efficiency and
must have a cyber incident management process
expanded capabilities, cybersecurity becomes
in place and know what to do when something
increasingly important. As organisations change
adverse happens.
their businesses models, the risks they face
• Fifty eight percent of Australian CISOs have experienced burnout. Mounting CISO pressures
change as well. • Skill-set shortage. Cybersecurity systems are
are making the job unsustainable. Fifty eight
only as good as the people who operate them, and
percent of Australian CISOs feel they face
with a rapidly evolving ecosystem it can be hard
unreasonable job expectations, according to
to find the right experts to operate key systems,
Proofpoint’s 2023 Voice of the CISO Report. With
especially as those key systems evolve. The
reduced cybersecurity budgets, personal liability
complex web of security vendors also places great
worries and accountability, managing cyber risks
demand on skills.
really takes a toll.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
49
KEY RECOMMENDATIONS FOR CISO TO ELEVATE LEADERSHIP SKILLS AND CHAMPION CYBERSECURITY:
understand legal and regulatory obligations
• Speak the language of the board. Keep the
organisation holds and where it is stored. It is
and the reputational consequences of a cyber attack. They must know what critical data their
points concise and clear with no jargon, include
vital they adopt a consistent risk assessment
terms like revenue, return on investment, margin
and governance posture across all three pillars:
and capital. Boards understand these terms.
people, process and technology.
Simplifying the link between cyber risk and
• Periodic review of control and response
business risk is crucial, and finding allies in the
measures. Boards must ensure they have
C-Suite is a key strategy.
appropriate incident response measures and
• Spearhead training initiatives and a cyber-aware
business continuity and contingency plans.
culture. Develop initiatives such as targeted
Boards need to ask their CISOs “Do you have a
anti-phishing campaigns and incident response
secondary line of protection, and can you respond
training across all layers of the organisation.
quickly to a failure? Are we testing all the layers?
Building a cyber-aware culture from the top down
What are the results?”
is essential because humans are the first line of
It is imperative to review cyber risk mitigation
defence against cyber attacks. CISOs must talk
strategies and make the necessary changes/
about the overall security program and strategic
improvements to ensure the maturity of cyber
initiatives to keep the business secure while
strategy is being measured.
measuring and reducing risk. • Use board time appropriately. CISOs must
Cyber risk management is a team sport and
understand the organisation risk appetite and
corporate boards must understand the role they play.
translate this into a risk posture the board can
Boards must also recognise that cybersecurity is not
understand. They should focus on the top material
a technology function, that cyber risk is a business
risks the board should be well aware of, adopt
risk and that accountability lies with everyone in the
a risk based approach and calculate a return on
organisation (not just the CISO). In situations where
security investment that can help justify security
there is significant risk for an organisation it is the
investments to the board. It is best to build KPI
responsibility of the CISO to raise awareness of that
metrics when presenting a security posture to
risk and spell out its impact and consequences to
top leadership.
the board as part of regular briefings, rather than
• Remain curious and aware. CISOs must
remaining silent.
constantly evolve their knowledge base and hone their soft skills: communications, public speaking
It is crucial to develop rapport. Board members,
and active listening.
CISO and other relevant stakeholders should invest in building connections and empowering each other.
KEY RECOMMENDATIONS FOR BOARD TO PARTNER WITH CISO TO MANAGE CYBER RISK: • Visibility of threat environment. Boards must understand the risk associated with systems that are critical to core business operations and their security posture. In regular briefings with their CISO they need to ask the right questions to know how best to help. They must ensure cyber risk is
This builds trust, an invisible key element within business which enables organisations to thrive. www.linkedin.com/in/neha-dhyani-cybersecurity
www.twitter.com/Neha_dhyan i1
www.linkedin.com/in/anjali-varghese
part of the broader enterprise risk program. • Continuous risk monitoring. Boards must
50
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Source2Create Spotlight
Content Content allows you to establish, share, and strengthen your brand. It helps build relationships which is why we are shining the light on our content service. Content strategies don’t just define the goals your content is intended to achieve, but also the procedure, processes and governance required to get there. We can show you how to manage your content effectively. We can then use that content to attract, acquire and engage your customer and new prospects, deepening your relationships. What are you waiting for?
REACH OUT TODAY
charlie@source2create.com.au
aby@source2create.com.au
LISA VENTURA
MIND THE (GENDER PAY) GAP IN CYBERSECURITY: ENSURING PAY EQUALITY FOR ALL by Lisa Ventura MBE, Founder – Cyber Security Unity
The gender pay gap in cybersecurity remains
what it did, and I wanted to make a positive difference
a persistent and concerning issue. Despite
there. So I would only receive £1,000 more than I had
advancements in recognising and addressing gender
been earning prior to joining the organisation.
disparities in various professions, the cybersecurity sector continues to demonstrate significant pay
I then discovered a male counterpart had also been
disparity between men and women.
offered a “head of…” role, at a level equivalent to the role I had been offered, but he had been given
Several factors contribute to the gender pay
a £15,000 pay increase. I left the organisation
gap in cybersecurity. One major factor is the
and had a short spell in logistics where I was paid
underrepresentation of women in what has,
fairly and treated equally. Then I returned to the
historically, been a male dominated industry. This
cybersecurity industry where I remain today and
underrepresentation can lead to systemic biases in
where I am paid fairly and at the same level as my
hiring, promotions and salary negotiations, which
male counterparts.
contribute to the pay gap.
52
THE GENDER PAY GAP IN CYBERSECURITY IS REAL: MY PERSONAL EXPERIENCE
SOME SHOCKING STATISTICS: WOMEN IN CYBERSECURITY ARE PAID 21 PERCENT LESS THAN MEN
I had heard many stories about the gender pay gap in
According to (ISC)2’s 2023 Cyber Security Workforce
cybersecurity, but I did not fully believe them, nor did I
Study, although nearly a third of the global
experience this pay gap until 2022. During my time at
cybersecurity workforce is now female, the industry
a leading cybersecurity organisation in the UK I was
continues to grapple with discrimination and a
offered promotion to a “head of…” role which came
substantial gender pay gap. Shockingly, women in
with a £5,000 pay increase. However, I had taken a
cybersecurity are paid, on average, 21 percent less
pay cut to join the organisation because I believed in
than men.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
In its analysis of data the (ISC)2 report shed light on the evolving role of women in the sector. Encouragingly, survey respondents estimated that women constitute over 30 percent of their teams today, a notable increase from approximately 25 percent the previous year. The study revealed other positive trends: 63 percent of female respondents said they had chosen to choice as early as their university days. This figure
WHY DOES THE GENDER PAY GAP EXIST IN CYBERSECURITY?
surpassed that for men, 54 percent. Moreover, over
The gender pay gap in cybersecurity is the result of
half (53 percent) of women initiated their careers in
several systemic, societal and organisational factors.
the profession, compared to just 38 percent of men.
These include:
The study also highlighted the commitment of women
• Underrepresentation
pursue a cybersecurity career, with many making this
to cybersecurity as a long-term career: 68 percent
Women are historically underrepresented in the
said they planned to stay in the field for the duration
cybersecurity sector. The low representation often
of their working lives. Job satisfaction among women
produces stereotypes and biases that impact
was notable, with 69 percent indicating they were
hiring, promotion and salary decisions. As a result,
either very or somewhat content, and women were
women may face barriers in accessing high-
more likely to report being very satisfied (34 percent
paying positions.
versus 27 percent of men). • Unconscious bias However, significant challenges persist, potentially
Unconscious bias, whether in hiring, performance
perpetuating gender imbalances in cybersecurity.
evaluation or promotion decisions, can
A noteworthy 22 percent reported experiencing
significantly contribute to the gender pay
discrimination in their careers, a higher percentage
gap. Preconceived notions about the skills,
than the 13 percent of men reporting the same.
capabilities and leadership qualities of women in cybersecurity can influence decision-makers,
Furthermore, the gender pay gap remains a
affecting salary negotiations and career
considerable concern, particularly in North America
advancement opportunities.
and Europe. Female cybersecurity employees in North America earn an average of just under $US80,000,
• Lack of mentorship and networking
significantly less than the average of around
The absence of mentorship and networking
$US96,500 for their male counterparts. In Europe,
opportunities for women in cybersecurity can
the average salary for women is approximately
hinder their career progression. Mentorship is
$US40,500, in stark contrast to the $US67,000
crucial for skill development, career guidance
earned by men. These disparities underscore the
and access to influential networks. Without these
need for continued efforts to address gender-related
support systems, women may find it challenging
challenges in the cybersecurity industry.
to navigate the industry successfully.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
53
Negative stereotypes about gender roles persist
HOW CAN ORGANISATIONS CLOSE THE GENDER PAY GAP IN CYBERSECURITY?
in cybersecurity. Stereotypes that associate
Closing the gender pay gap in cybersecurity requires a
technical proficiency with masculinity can
concerted effort from multiple stakeholders, including
influence perceptions of women in technical roles,
employers, educational institutions, policymakers
affecting their perceived value and, consequently,
and individuals. Here are several strategies that
their compensation.
can contribute to narrowing the gender pay gap
Negative stereotypes
in cybersecurity. • Education and training gaps Disparities in educational opportunities and
• Promote equal pay policies
training can contribute to the gender pay gap. If
Companies should adopt and actively enforce
women have less access to quality education and
equal pay policies, ensuring all employees,
training programs in cybersecurity, they may find
regardless of gender, receive equal pay for
it more difficult than their male counterparts to
equal work. Transparent salary structures
secure high-paying positions.
and regular pay audits can help identify and rectify discrepancies.
• Lack of transparency Many organisations lack transparency in their
• Encourage salary transparency
salary structures, making it difficult for employees
Promote transparency around salary structures
to assess whether they are being paid fairly.
within organizations. Open discussions about
Without clear information, women may be ill-
pay can help eliminate disparities and empower
equipped to negotiate salaries and advocate for
employees to negotiate fair compensation.
equitable compensation. • Support diversity and inclusion initiatives • Limited representation in leadership roles
Create and support initiatives that foster diversity
The scarcity of women in leadership positions
and inclusion within cybersecurity organisations.
within cybersecurity organisations exacerbates
Establishing a diverse and inclusive workplace
the gender pay gap. Companies with more diverse
culture can lead to fairer treatment, opportunities
leadership teams are often better equipped to
and compensation for all employees.
identify and address disparities, fostering a more inclusive and equitable work environment.
• Provide mentorship and networking opportunities
• Work-life balance challenges
Establish mentorship programs and networking
Women may face unique challenges related to
opportunities specifically designed to support
work-life balance, particularly if organisational
women in cybersecurity. Mentorship can help
cultures do not support flexibility and family-
women navigate their careers, gain access to
friendly policies. Balancing family responsibilities
opportunities and develop the skills needed
with career demands can impact women’s career
to advance.
trajectories and earning potential. • Address unconscious bias • Negotiation disparities
Implement training programs to raise awareness
Research suggests that women, on average, may
about unconscious bias in hiring, promotion
be less assertive in negotiating salaries than men.
and salary decisions. These should encourage
This negotiation disparity can result in women
objective evaluation criteria and decision-making
accepting lower initial offers and, consequently,
processes to reduce the impact of bias.
earning less over the course of their careers.
54
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
FINAL THOUGHTS Closing the gender pay gap in cybersecurity is a multifaceted challenge that requires ongoing commitment and collaboration. It requires a comprehensive approach that includes efforts to promote diversity, eliminate bias, provide mentorship opportunities and foster inclusive workplace cultures. By recognising and actively working to mitigate these factors, the cybersecurity industry can take significant steps toward achieving gender pay equity. We must do better and be better to ensure the future of the industry and to attract as many people into • Promote educational opportunities Encourage and support women in pursuing
the industry as possible to enable it to combat the growing cyber threat.
education and training in cybersecurity. Bridging the gender gap in education can help create a larger pool of qualified female candidates for
LISA VENTURA MBE - BIOGRAPHY
cybersecurity roles.
Lisa Ventura MBE is an award-winning cybersecurity specialist, writer and keynote
• Advocate for policy changes
speaker. She is the founder of Cyber Security
Advocate for policies at the organisational and
Unity, a global community organisation dedicated
governmental levels that address gender pay
to bringing individuals and companies together
disparities. Such policies include legislation
who actively work in cybersecurity to help
promoting pay equity, family-friendly workplaces
combat the growing cyber threat. In addition,
and other measures that support gender equality.
Lisa is a senior specialist at Qualitest and is in high demand as a speaker and writer on various
• Provide career development opportunities
topics in cybersecurity including the cyber
Offer career development programs and
skills gap, career pathways into the industry,
opportunities for skill-building to help women
managing mental health and burnout, imposter
advance in their cybersecurity careers. These
syndrome, combatting bullying and abuse in the
can include training, workshops and access to
cybersecurity industry, cybersecurity’s image
resources that facilitate professional growth.
problem and the human factors/elements of cybersecurity.
• Create supportive work environments Foster a workplace culture supportive of worklife balance, flexible schedules and family responsibilities. A supportive environment
www.linkedin.com/in/lisasventura
contributes to the retention and advancement of women in cybersecurity. • Celebrate and recognise achievements
www.twitter.com/cybergeekgirl
www.twitter.com/cybersecunity
Acknowledge and celebrate the achievements of women in cybersecurity. Recognising their
www.youtube.com/@CyberSecurityLisa/videos
contributions helps to break down stereotypes and promotes a culture of equality.
I S S U E 18
www.instagram.com/lsventurauk
WOMEN IN SECURITY MAGAZINE
55
LISA JANE YOUNG
STRENGTHENING CYBER RESILIENCE THROUGH CAPACITY BUILDING by Lisa Jane Young, APAC Intelligence Officer, FS-ISAC
professionals remains an issue despite collaborative
UNRAVELLING AUSTRALIA’S CYBER THREAT LANDSCAPE
efforts by governments and industry to encourage
Australian and Asia-Pacific (APAC) companies
and incentivise entry into the sector. In Australia,
remain highly susceptible to third-party and supply
efforts to address the shortage include collaborating
chain risks. For example, Medibank’s breach in
with technical and further education institutions
October 2022 exposed the personal information of
(TAFEs) and colleges, launching educational
9.7 million people as a result of a third-party vendor
programs for school-aged children and providing
being hacked. Multiple ransomware events have
free cybersecurity training online through platforms
had catastrophic effects on Australian operations
like SkillFinder. However, despite these measures the
over the last 12 months, both directly and indirectly.
shortfall in qualified cybersecurity professionals is
On the geopolitical front, Australia’s position as a
forecast to hit 30,000 across Australia by 2026.
prominent and relatively stable Western economy
The longstanding shortage of cybersecurity
makes it susceptible to hacktivism from nation-state This talent gap is one reason for the Australian
adversaries. This array of potential threats means
cybersecurity sector lagging behind its international
that building operational resilience has become a top
peers. Australia’s cyber sector annual revenue growth
priority for financial firms.
has averaged 8.7 percent annually over the past five years, compared to an average of 11.5 percent for
The question for every organisation in Australia’s
other leading cyber jurisdictions, and behind the US,
financial sector is no longer if an attack will occur,
China, the UK, Japan, Germany, France, Canada and
but when.
South Korea. This shortage, and a rapidly evolving
56
threat landscape, emphasise the need to develop
SETTING THE TONE FROM THE TOP
cyber resilience, with capacity-building at the heart of
Capacity-building through quality leadership is crucial
such efforts.
to addressing the challenges of cybersecurity and
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
talent development amid today’s threat landscape.
a firm’s continued ability to operate, even when
Executives and business leaders set the tone by
under attack.
providing a clear strategic vision and allocating resources for cybersecurity and talent development.
Additionally, these exercises help ensure and
Senior staff are responsible for improving board-level
cultivate a prepared and resilient workforce capable
engagement to ensure commitment to cybersecurity.
of effectively responding to new and increasingly
Cyber employees need leadership, development
sophisticated threats such as artificial intelligence
opportunities and support to lift job satisfaction and
(AI) enabled fraud.
reduce attrition. Integrating cybersecurity into existing corporate frameworks—particularly the enterprise risk framework—is also essential.
HARNESSING THE POTENTIAL OF DISRUPTIVE TECHNOLOGIES With malicious actors already incorporating
Business leaders must also emphasise
emerging technologies into their threats, tactics
collaboration and policy support initiatives. These
and procedures, firms must harness the potential of
include: promoting cooperation among private
emerging technologies, including machine learning
and public stakeholders; participating in sector-
and artificial intelligence, to enhance the productivity
relevant forums; focusing on better practice; and
of existing talent and mitigate the talent shortage.
advocating for supportive regulatory frameworks.
By automating labour-intensive and repetitive tasks,
For example, recent large-scale attacks in Australia
these technologies free up an already scarce pool
have led to greater public-private consultation
of cybersecurity professionals to focus on more
and, subsequently, calls for customer data to be
sophisticated and nuanced responsibilities such
classified as critical infrastructure under Australia’s
as threat analysis, incident response and strategic
Security of Critical Infrastructure Act (SOCI). This
decision-making.
collaborative approach enhances the exchange of knowledge, threat intelligence, best practices and
DIVERSITY FOR CAPACITY
other resources, thereby strengthening the overall
Promoting diversity and inclusion in the cybersecurity
cybersecurity landscape.
workforce is also vital for capacity-building. A diverse team brings a wide range of perspectives and
BUILDING MUSCLE MEMORY AGAINST ATTACKS
ideas, enhancing the effectiveness of cybersecurity
Cyber exercises are integral to capacity-building
into a broader talent pool can help address the
efforts and enhancing a firm’s cyber and business
industry’s talent shortage and strengthen its
resilience. Formulating a comprehensive incident
resilience against evolving cyber challenges.
response plan and regularly testing and refining this
Moreover, an inclusive work environment fosters
plan through cyber exercises allows organisations to
collaboration, trust and engagement, contributing
address weaknesses and build the muscle memory
to a more cohesive and productive cybersecurity
for a prompt and coordinated response, ensuring
team. Embracing diversity not only benefits industry
I S S U E 18
operations when tackling complex threats. Tapping
WOMEN IN SECURITY MAGAZINE
57
capabilities but also enhances an organisation’s
remain resilient amidst an ever-evolving cyber
reputation: it appeals to clients and partners who
threat landscape.
value socially responsible practices.
ABOUT THE AUTHOR
FOSTERING RESILIENCE THROUGH CAPACITY BUILDING
Lisa Jane Young (LJ) is an intelligence and risk
Amidst the talent shortage and the evolving threat
professional with 20 years experience. She is an
landscape, strengthening cyber resilience through
APAC intelligence officer at FS-ISAC and principal
capacity-building is crucial for Australia’s financial
at LJY Consulting. Prior to joining FS-ISAC, she
sector. Adopting new technologies, conducting cyber
held senior roles with the Australian Criminal
exercises and collaborating with industry, academia,
Intelligence Commission (ACIC), the Australian
and government are vital for preparedness. Initiatives
Taxation Office (ATO), the Insurance Australia
like the Financial Services Information Sharing
Group (IAG) and the New South Wales Police.
and Analysis Center’s (FS-ISAC) Women in Cyber
She holds masters degrees in both criminal
scholarship program—which produced an Australian
intelligence and public policy and co-authored
winner this year—showcase the benefits of promoting
Managing Intelligence: The Art of Influence
diversity and inclusion in cybersecurity. Quality
(Federation Press, 2010), the first textbook to
leadership remains crucial for capacity-building
set out the practical aspects of leading and
because top executives allocate resources and set
managing an intelligence function.
the tone for cybersecurity and talent development. Embracing capacity-building initiatives across these areas allows Australia’s financial institutions to mitigate the impact of the talent crunch and
www.linkedin.com/in/lisajaneyoung
Congratulations to all nominees and winners of the 2023 New Zealand Women in Security Awards
58
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Need a professional marketing, strategy and implementation agency that is dedicated, responsive, professional, creative, innovative, hardworking, and really cares about your business outcomes?
Then let us help YOU. REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.
With:
aby@source2create.com.au charlie@source2create.com.au source2create.com.au
DIVERSITY IN CYBERSECURITY AT SPARK: THREE REALITIES Spark NZ was named Best Place to Work in IT
“I was raised by a solo teenage mother who had little
Security in the 2023 New Zealand Women in Security
income and was reliant on welfare, so my goal was
Awards. We reported on the achievement elsewhere
to create a better life for myself,” she says. “I believed
in this edition of Women in Security, citing Spark’s
that determination, higher education and hard work
“unwavering commitment to fostering diversity
could get me there.”
and inclusion,” and detailing a number of specific initiatives that contribute to making that commitment
However the lack of role models meant information
a reality.
technology was not on her career radar. “I perceived it to be purely technical and the visibility of it was
Here we look at what this means for Spark people,
limited to the stereotypical ‘computer geek’ in movies.
tracing the career trajectories of women from
That didn’t interest me at all,” she says.
three very different backgrounds who are all now in cybersecurity roles at Spark. All are standout
Celene signed up for a Bachelor of Commerce
employees: finalists in various categories in the 2023
at Victoria University in Wellington but was soon
New Zealand Women in Security Awards. They are:
persuaded to pursue IT instead. “I was encouraged by the careers advisor to consider IT,” Celene says. “Her
Celene Aitchison, Security Certification and
advice was that it’s a growing industry with a skills
Accreditation Specialist, finalist for the Best
shortage and pays well. That was all I needed to hear!”
Volunteer award.
FROM COMMERCE TO IT AND HR Gunjan Bhaskar, Virtual Security Specialist, finalist for
So Celene switched her majors to Information
the Best Security Student award.
Technology and Human Resources. “Taking both IT and HR as core subjects used my strengths in
Cherry Liwag, Chapter Lead Security Certification
different ways, and a varied curriculum meant I didn’t
and Accreditation, finalist for the Cybersecurity
get bored of one subject,” she explains. “Having these
Champion award.
vastly different majors also opened the doors to more potential job opportunities when it came time
Celene Aitchison grew up in a small suburb in
to graduate.”
Rotorua in humble surroundings where there were no
60
role models working in technology-related jobs. She
After graduating, Celene’s first job was in an IT audit
had a very poor image of technology as a career, but
role with KPMG as a member of its Cybersecurity
strong aspirations.
Consulting team, part of Risk Consulting. “I was
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
primarily responsible for security risk assessments, IT controls audits, cyber maturity assessments, privacy risk assessments and wider IT resilience reviews,” she says.
Celene Aitchison
After just over two years in the role, Celene was promoted to Assistant Manager, responsible for leading the technology reviews of major audits. She spent five years at KPMG before joining Spark in January 2023 and, when presented with the opportunity of an internal-facing audit and compliance role at Spark, says she “decided it was a good time to work on the other side.” At Spark, Celene says she is “able to play a key role in the investigation and remediation of security vulnerabilities rather than just reporting them. I also
“Cybersecurity provides a pathway with endless
get to focus more on increasing security maturity
options that don’t limit you to one specialist
within the organisation.”
domain. It’s a career with really good rewards and recognition, as well as promotional and development
VOLUNTARY ROLES
opportunities. All you need to do is look at the
Now well established in her career, Celene is helping
headlines and hiring trends to see that IT-related roles,
guide others by playing a number of voluntary roles.
even in a slower labour market, are increasing.
For almost three years she has been a role model with Inspiring the Future Aotearoa, an initiative that aims
“There are entry-level jobs or short courses that can
to inspire young people throughout New Zealand to
open the doors for someone starting out. The reality
consider different career options.
is that what you learn from textbooks or lectures over three years will likely be redundant when you’ve
She says role models for young people are still in
completed the course. For those interested in
short supply. “This is especially evident in the Bay
cybersecurity, I often suggest a short course covering
of Plenty region where I volunteer now. Students are
the basics, like Security+, to show eagerness and
asked to guess the role models’ jobs. Most guesses
willingness to learn. Next is to source an entry-level
for me are receptionist, office lady or influencer. When
job where you’ll learn on the job and receive training
I tell them about my job, their minds are blown. By
and support from others. Everything I’ve learned
attending career events at schools in the regions,
to get to where I am was actually on the job. I was
I’m trying to create visibility of a young person
fortunate to have great team members to learn from
succeeding in a career in technology.”
and guide me.”
In this volunteer role, Celene often tells students
CAREER ASPIRATIONS
that university is not the only route to a successful,
For herself, Celene envisages moving into audit
well-paid career, particularly in cybersecurity. “As a
quality assurance because of “the satisfaction I get
young person who didn’t come from a wealthy family,
from developing consistent approaches and best
I would’ve loved the idea that I could get an entry-
practice guidance for auditing, and then reviewing
level job with the potential for development and high
compliance to these,” she says. “I often tell others I
income one day without accumulating student loan
want to ‘audit the auditors’ in terms of technology risk
debt,” she says.
and security controls.”
I S S U E 18
WOMEN IN SECURITY MAGAZINE
61
To this end Celene obtained the Certified Information
Gunjan Bhaskar gained two degrees in her native
Systems Auditor (CISA) certification this year and
India: a Bachelor of Science in Computer Science and
wants “to continue similar training in the security and
a Bachelor of Education in Physics and Mathematics
auditing space that aligns with the audit QA pathway
and Elementary Education and Teaching and became
I’m passionate about.”
a high school teacher.
She has thought about studying to become an internal
She planned to continue with this career after
security assessor, saying: “An ISA helps to increase
migrating to New Zealand, but things did not work
the understanding of PCI DSS across the organisation,
out. First, she needed the certificate of registration
enhance the quality, reliability and consistency of the
which, between the occasional unrelated jobs and
organisation’s internal PCI DSS self-assessments, and
working as teacher reliever, took her a good two years
supports the consistent and proper application of PCI
to achieve. However, she was still unable to get a
DSS measures and controls.”
teaching job beyond early childhood education so cast around for a new career.
Celene believes working at Spark opens up many options. “In a large corporate like Spark
“I realised I needed to find a career in IT because I
there are plenty of opportunities to upskill
always had an interest in this field. However, since I
across different security or technology domains.
was starting from scratch at the age of 28, I had to
Spark supports internal moves, so there may
make sure this worked,” she says. “While researching
be opportunities to move into another security
and talking some more about career opportunities
domain within the tribe.
in NZ, cybersecurity came up. It caught my eye because it had promising job prospects and I found
“To become an even better auditor in years to come,
it challenging as well as engaging: something I
Spark offers the ability to cross-skill and become
was looking for in my career. I found a good course
proficient in the various regulatory standards and
at Unitec, doing the Level Six Graduate Diploma
frameworks we comply to. Working both with internal
in Cybersecurity.
teams across network and operations as well as with external auditors continually enhances my audit skills
“The course covered a wide range of subjects
as well.”
in cybersecurity. It also came with an internship opportunity to extend our theoretical knowledge and gain industry experience. It is a very well structured programme with many opportunities to learn and gain practical experience. I would highly recommend this
Gunjan Bhaskar
course to someone who wants to join the IT industry, but you do need a bit of background knowledge about computing.”
BECOMING AN INTERN AT SPARK Gunjan undertook her internship at Spark. She says this was pivotal to her career. “Learning theories at college is one thing, but getting to see how these translate to work is a whole other experience. I was fortunate enough to have had that experience. The program opened my eyes to possibilities that I didn’t even know existed.
62
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
“The sessions at Spark gave us deep insight into
She says working at Spark also provides opportunities
cybersecurity topics. I was always asking questions
for further study. “Spark offers Udemy subscription
in the sessions which also helped me perform well at
for you to prepare for certifications. For example,
my college submissions. It gave me an opportunity to
currently I am studying for my Security+ examination.
network with like-minded individuals working at Spark
You also learn a lot from your peers and colleagues
and ask for their guidance and help. The program was
while working together. They are always ready to
like a window giving me a glimpse of reality.”
answer questions and help you with difficult tasks. Spark also has a job rotation programme which
She almost missed out on this opportunity: her first
allows you to shadow employees in a different field
application did not get her an interview so she went
of cybersecurity. All of these initiatives support you to
back, rewrote it and applied again. Her advice to
achieve more in your role.”
others on this is: “Be honest about your CV. You want to reflect your efforts to transition into this field. You
Cherry Liwag, a native of The Philippines, also came
want all the information to be up to date and precise.
from humble beginnings. She aspired to become a
And a one-page CV is always the best.”
doctor but the financial barrier was too great so she opted to study for a BSc in Computer Engineering.
While studying, Gunjan also got an opportunity to
“The most sensible choice was to pursue a degree
work part-time as an information security analyst at
that would readily secure employment, enabling me to
Unisphere Solutions, after which she joined Spark as a
contribute to improving our family’s quality of life,” she
virtual security specialist in September 2023.
says. ‘I didn’t have extravagant career ambitions; my primary goal was to secure a job that contributes to
A FULL TIME ROLE AT SPARK
the well-being of my family.”
She says the role encompasses building security assurance reports for customers, supporting Virtual
However, the nearest she got to a computing job
Security Manager (VSM) on an ad-hoc basis, helping
after graduating was working as a telemarketer for a
with the vulnerability management process and
computer software company. But when the company
facilitating customer meetings. A VSM is a Spark
was looking for a trainee Java programmer, Cherry
service in which a Spark employee is embedded in
applied and got the job. “I underwent training and
a customer organisation to help the customer meet
actively contributed to the development of Java
security objectives.
programs for our clients. Following the completion of my contract, I transitioned to focus more on
Gunjan has gone on to gain multiple cybersecurity
programming, specifically in web development.”
certifications: Security Awareness Graduate credential from Wizer, the Sophos Engineer Certification and
She then moved into a quality assurance role at
certifications from Microsoft in Security, Compliance
another software company, and describes this as a
and Identity Fundamentals and Azure Fundamentals.
significant career shift into a role that suited her well.
“All these certifications provided me with fundamental knowledge about standard security practices,”
FROM TELEMARKETING TO QUALITY ASSURANCE TO SECURITY COMPLIANCE
she says. “They helped me gain the background
“I was initially uncertain about whether it was the
knowledge I lacked because of my previous teaching
right trajectory for my career,” she says. “I recognised
career. They also helped me understand the tools and
it demanded a dedicated commitment to learning
techniques used in cybersecurity. Cybersecurity is a
new tools and technologies associated with quality
vast field, and sitting those certifications helped me to
assurance. Given the project requirements, I decided
find my niche in in the sector.”
to embrace the change.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
63
“Surprisingly, this transition proved pivotal for the
Cherry joined Spark in 2019 as a security advisory
project’s proactive development. Fortunately, I could
consultant and took on her current role as chapter
leverage my existing development skills. I discovered
lead for security certification and accreditation in
a newfound affinity to QA due to my meticulous
January 2023. It is her first leadership role, and
nature and my innate attention to detail and
brought new challenges.
problem-solving skills. My satisfaction now stems from ensuring the quality of the software I deliver,
“Confronting imposter syndrome has been a genuine
contributing to an enhanced overall user experience.”
challenge for me, as self-doubt and feelings of inadequacy often arise,” she says. “It’s a common
In 2010, she relocated to Singapore to explore
struggle for many female leaders. However, valuable
opportunities beyond her home country. She landed
advice from mentors emphasises the importance of
a fixed term contract as a Quality Management
acknowledging these feelings. Understanding that
System Administrator; this marked the beginning of her
nobody is perfect allows for constructive action.
journey at Fujitsu. And then she transitioned to Security
By recognising these sentiments, I turn them into
Compliance, where she’s given the opportunity to
positive drivers for personal improvement.”
be a part of a team launching the SAP IaaS Cloud business. At that time, she taught “Cloud is the next
RESPONSIBILITIES AND CHALLENGES
big thing” so she equipped herself and proactively
However, she says a greater challenge comes from
pursued training and certification, encompassing ITIL,
the nature of her role. “My main responsibilities
COSO, and various ISO standard family.
include defining security C&A strategy, overseeing governance and enhancing roadmaps for meeting
Cherry showcased her proficiency in Audit
various security legislation, compliance frameworks
Management, Quality Management and Security
and commercial obligations while managing risks for
Management. Her contributions extended to helping
all the standards we need to adhere to. We focus on
the BAU team in implementing controls to achieve
standards such as ISO 27001, NZISM, PCI DSS and
compliance outcomes. As one women team she
ISAE 3402.
collaborated with diverse stakeholders within the organization, leading to attain certifications
“Security certification and accreditation is a process
such as ISO 27001 and ISAE 3402 SOC 2 Type II
that ensures products, platforms, systems and
compliance. Her focus remained on ensuring the
applications meet specified security requirements
cloud business aligned with legal, regulatory, and
and standards. With the increase in demand from our
compliance requirements.
customers, and ever-evolving requirements, our team is focused on ensuring Spark continually complies
Developing an interest in auditing, Cherry attained
with various security legislation and compliance
certification for ISO 9001 (Quality Management
frameworks as well as our commercial obligations.”
System) and ISO 14001 (Environmental Management
64
System). Leveraging this expertise, she played a role
Her team is also responsible selecting security
in guiding the organization to achieve certification in
controls, ensuring they are implemented, assessed,
these standards.
certified, accredited, and continuously monitored.
In 2016, She was offered a job on consulting
“It is a comprehensive and iterative process to ensure
company here in New Zealand. To help setup the ISO
that information systems maintain an appropriate
27001 framework of the organization and its clients.
level of security throughout their lifecycle,” Cherry
She also gained certification for eWAPTx (Advanced
says. “Each role in the process plays a vital part in
Web Application Penetration testing) to expand
achieving and maintaining a secure and accredited
her portfolio.
information system.”
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
And Cherry says it is important to spread these roles evenly between men and women on her team. “I ensure the distribution of workloads between men and women within our team are balanced. I also aim
Cherry Liwag
to be a supportive ally to any women’s initiative or programme within Spark. “Women tend to give/have a different perspective. We can use this different perspective to see a wider picture. This will amplify women’s contribution and ensure they have the opportunities to shine.” Cherry also plays her part in Spark initiatives to upskill and ‘side skill’ staff, supporting Spark’s Cyber Security Tribe job rotation program that gives individuals learning and development opportunities across
Looking back on her career trajectory, Cherry says
different domains within security. “This commitment
growing up in a low-income family was the foundation
aims to empower our team members to cultivate a
of her career success.
well-rounded security skill-set and gain exposure to various facets of security within Spark, as well as the
“This experience instilled in me resilience,
adaptability of our cybersecurity team,” she says.
resourcefulness and a strong work ethic. It moulded my deep appreciation for the value of education and
She also hosts staff from other security areas,
hard work. I used this as motivation to break the cycle
showcasing what her team’s work entails and
of poverty.
providing them with a better understanding of regulation requirements and information security
“This has been one of the biggest influences for
standards, including control implementation,
me and my career thus far, inspiring my willpower
control assessment and other certification and
to help elevate the quality of life, not only my own,
assurance activity.
but also that of my entire family. It propels me to relentlessly pursue opportunities, often in the face of
CAREER ASPIRATIONS
daunting challenges.
For herself, her career aspiration is to become a CISO “just like the majority of cybersecurity professionals”.
“It instils a sense of gratitude for all progress made.
She envisions herself at the helm of strategic
My story is a testament to the power of perseverance
decision-making, developing and implementing
for personal and familial success, despite
robust security frameworks to safeguard
socioeconomic constraints. This leads my desire to
organisational assets.
contribute positively to the community, driven by a firsthand understanding of the challenges faced by
“I am committed to staying at the forefront of evolving
those in similar situations to mine.”
cyber threats, leveraging my expertise to secure defences and ensure the resilience of information systems, she says. “Beyond technical proficiency, I aspire to cultivate a culture of cybersecurity awareness within the organisation, emphasising the importance of proactive risk management and compliance.”
I S S U E 18
www.linkedin.com/in/celene-aitchison
www.linkedin.com/in/gunjanb31
www.linkedin.com/in/cherrysliwag
WOMEN IN SECURITY MAGAZINE
65
MELANIE NINOVIC
INSPIRING YOUNG GIRLS INTO STEM by Melanie Ninovic, Principal Consultant at ParaFlare
When I think of the future of women in our industry,
that teach young girls about STEM and inspire them
I think of the young girls who are in school and yet
to learn about STEM. Here are some things we can do
to choose what they will study in Years 11 or 12,
as industry professionals.
or beyond. And I think of the women who have just graduated from higher education or university and
THE PROBLEM, SCHOOL
need to decide where they want to start their careers.
In July 2023, the Department of Industry, Science and Resources updated its STEM Equity Monitor2,
At least some of them will consider studying or
which identifies current trends in women and girls’
joining a STEM profession and, by extension, the
participation in STEM in Australia. The research found
cybersecurity industry. However, far fewer will do so
the majority of students who undertake many of the
than their male counterparts.
year 12 STEM subjects, particularly science (biology, earth science, chemistry, and agriculture), are girls.
A 2021 study conducted by the University of Houston
However, in areas of STEM such as engineering and
and the University of Washington found boys
IT, this has not improved at a similar rate.
becoming more interested in STEM subjects than girls as early as the age of six1. The research also
Unfortunately, there was little other good news from
found that, by the time girls reach high school the
the study. It found only 21 percent of schoolgirls
gap has widened greatly, and many girls have already
aspire to have a career in STEM. So, most girls know
decided against pursuing education in STEM subjects
what STEM is and the subjects involved, but they have
in later years.
no interest in pursuing these further. And interest or confidence to study or work in STEM only declines as
You might be shocked to hear this, and trust me, so
girls get older.
was I. Perhaps you’re thinking, ‘what can we do to
66
change this reality?’ As parents we can introduce
This is the bleak reality wherever you look in the
our daughters to STEM activities before they begin
world. However, there is hope for a better future. As
school. As educators we can lead inclusive programs
industry professionals, advocating and being a role
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
model for our young female family members, and
THE SOLUTION
volunteering in tailored STEM programs are some
To have any chance of boosting young girl’s
steps we can all take to shift this balance.
understanding of STEM and their appreciation of its career possibilities we must start when they are as
HIGHER EDUCATION
young as five. Sharing our stories and showing girls it
When I was in Year 12 my only options for studying
is possible to have a successful career as a woman in
cybersecurity were to apply for a Bachelor of
STEM can be a powerful way to do this. Remember,
Computer Science or an information technology
you can’t be what you can’t see. Girls need role
degree. Times have changed. There are now many
models like us to look up to.
avenues to study STEM subjects, and specifically cybersecurity, in TAFE, colleges or universities.
That is not to say our careers are all sunshine and rainbows. We still have a gender pay gap in our
Sadly, women remain underrepresented in university
industry. We know women are often overlooked
enrolments and course completions within
for promotion and are poorly represented in top
engineering and IT. Within these two fields, women
positions. We have a duty to young girls to be honest
only account for 19% and 21% of the enrolments
about these challenges, but at the same time show
respectively. In sciences though, women make up
them the significance of STEM. Our communities
over half of all student enrolments, specifically around
depend on what we do, and our work is incredibly
environmental, natural, and physical sciences.
important especially for Australian businesses.
Of course, university courses are not the only
If you have the time and capacity, the following are
pathway to working in STEM, or in cybersecurity.
some of the possible ways you can help improve
In our industry there are many avenues available.
gender diversity in STEM.
These include self-teaching, enrolling in free online learning courses and consuming technical resources
VOLUNTEERING
produced by the community. I feel awareness of these
There are some incredible non-profits and
options is not as great as it could be, and we should
organisations that focus solely on promoting STEM
strive to communicate these options to our Year 12
to young girls. The following are some examples that
graduates and even those in higher education who
often look for STEM coaches, mentors or volunteers.
may feel stuck in what to do. • VIC ICT for Women has programs to guide
THE WORKFORCE
girls and women through school and university
In 2021 women accounted for 27 percent of the
and help them enter and progress through
Australian workforce across all STEM industries.
professional careers in tech. Go Girl is its program
When we look at the cybersecurity industry in
that aims to promote empowerment through
Australia, women represent only 17 percent of the
science, technology, engineering, the arts, and
workforce, according to a study by RMIT’s Centre for
mathematics (ESTEAM) in schoolgirls from Years
Cyber Security Research and Innovation . 3
5 to 12. • Tech Girls Movement hosts an annual competition
One of the biggest problems arising from not having
that brings together teams of schoolgirls between
a balanced workforce is that it hampers innovation
Years 7 to 12. Each team requires a volunteer
because there is a lack of the diverse perspectives
mentor and industry coach who guides them
that women from different backgrounds or career
through the competition to build a technical
paths can bring.
solution to a common global or local problem.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
67
• Curious Minds is a six-month program (including
You can do this by simply sharing your own story and
a camp) for girls in Years 9 and 10 delivered
the joy your career brings you (if you feel that way).
by the Australian Mathematics Trust and
Seeing you passionate about the work you do would
Australian Science Innovations. It presently has
inspire them even more. If you can, show them what
an expression of interest for STEM coaches on
you do for work. They will love the interaction and
its website.
will probably ask a few questions too. Other ideas
• Purple Team Australia is a program funded by the
can include:
Australian Government to increase the number of female and First Nations Australians in the
• Discussing how girls are not just as skilled in STEM subjects as boys, but how women are just
cybersecurity industry.
as successful in STEM fields.
• Tech Career Paths 4 Girls (TCP4Girls) is a new program that aims to expose young girls to
• Praising any efforts girls make in their curiosity
amazing role models and inspire them to explore
and efforts exploring STEM subjects. If they show
tech careers before stereotypes kick in.
an interest in a particular STEM subject, talk to them about one of the leading figures in that
ADVOCATING
field such as Ada Lovelace (mathematics), Grace
As STEM professionals we need to convince girls
Hopper (computer science), Marie Curie (physics/
that, if they are interested in STEM, they absolutely
chemistry), Mary Jackson (engineering).
can achieve career success in STEM. There are also
• Need a gift idea for Christmas or a birthday? If
opportunities for the cybersecurity community to
one of your female family members (ages 5+) has
become more involved with older girls and share why
taken an interest in STEM, purchase a STEM gift
being in STEM is a great career choice.
or, even better, take them to a STEM workshop during the school holidays. Nothing beats real
• Most Australian universities have a STEM program
world experience, even when kids are so young
that you can reach out to. See if they would be
(Jaycar is not the only provider of these events.
open to having you come to a STEM/career day
Take a look around and see what’s local to you).
to discuss your own path into STEM. Reach out to your high school and offer to present
However big or small your contribution may be, the
to an IT class or group of girls who might take
cybersecurity industry and our community will have
an interest in STEM. I remember being on the
been positively impacted. The more diverse Australia’s
receiving end of such a presentation in my Year
STEM workforce becomes the better we will be in
11 software development class and can still recall
being able to solve complex problems.
the excitement I felt hearing about the female presenter’s programming career.
REFERENCES 1.
BE A ROLE MODEL
november-2021/11222021-stem-stereotypes-
According to the 2023 STEM Equity Monitor, only half of Australian parents talk to their daughters about
study.php 2.
STEM each week. Whilst this was an improvement on previous years, we should aim to communicate these topics whenever possible. If you have a daughter,
https://uh.edu/news-events/stories/2021/
https://www.industry.gov.au/news/state-stemgender-equity-2023
3.
https://www.rmit.edu.au/news/all-news/2023/ apr/cyber-gender-report
niece, granddaughter, female cousin or any other member of your family who fits the demographic of those whose perceptions we need to change, bring
www.linkedin.com/in/melanie-cybers
them on the journey.
68
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Want to get matched with Lead Gen experts but dont know where to start?
Our solution experts can help you find the right supplier, Looking to streamline your B2B lead generation process?
Want to use multiple suppliers but dont have time to coordinate? Need a consistent stream of leads coming into the sales team? Looking to tap into new markets? Need end-to-end lead nurture programs?
LET US HELP YOU OVERCOME YOUR LEAD GEN CHALLENGES REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.
With:
aby@source2create.com.au charlie@source2create.com.au source2create.com.au
JO STEWART-RATTRAY
PAM NIGRO
SUSHILA NAIR
ISACA LEADERS FROM ACROSS THE GLOBE REFLECT ON THE FUTURE OF WOMEN IN SECURITY by Jo Stewart-Rattray, ISACA’s Oceania Ambassador and Chief Security Officer of Silverchain Group Pam Nigro, ISACA Board Director and Vice President of Security and Security Officer at Medecision Sushila Nair, Vice President of ISACA Greater Washington, D.C. Chapter and Vice President, North America Cybersecurity Practice Lead, Capgemini
As we enter another year brimming with technological developments we security professionals must not only commit to developing our knowledge and expertise—particularly of AI and ML—but also to ensuring women become central to algorithmic
WHAT EMERGING TRENDS AND TECHNOLOGIES IN SECURITY ARE LIKELY TO IMPACT THE ROLE OF WOMEN IN THE INDUSTRY? HOW CAN WOMEN PREPARE FOR AND CONTRIBUTE TO THESE CHANGES?
design. It is so important for gender bias to
Jo: The biggest changes are coming through the
be minimised and for women to receive equal
use of AI. As a result there is the potential for
opportunities in one of the most rapidly growing
automation to change the way jobs are structured,
technology sectors on the planet.
or indeed the way we work. I think we all need to take the opportunities available to upskill and cross
70
Here, three security leaders share their personal vision
skill in preparation for these changes. Employers
for the future of women in security.
must ensure they provide opportunities to reframe
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
roles accordingly and offer team members the
Sushila: With AI being a transformative technology it
chance to learn new skills so they feel confident and
is vital that its development draws on diverse inputs,
empowered entering this new phase of technological
including those from women. Instances of AI bias,
growth. Upskilling and reskilling provide professionals
such as systems favouring male job candidates,
with the comfort and confidence they need, and
highlight the need for inclusive AI training datasets.
the organisations that employs them the skillsets
Similarly, women must embrace human-centric
they need.
security design to ensure biases are countered and inclusivity is built in. To thrive in a rapidly developing
Pam: The hottest issue right now is the fusion of AI
environment women can embrace remote work and
and ML in the realm of cybersecurity. This fusion
the flexibility it affords. Developing strong remote
is rapidly gaining significance in the context of
communication skills and demonstrating their ability
threat detection and response. These technologies
to lead and inspire dispersed teams effectively can
empower the creation of innovative security solutions
help women sustain remote work opportunities, which
capable of automating intricate tasks, processing
are crucial for gender equality in the workplace.
vast datasets and discerning potential threats with swiftness and efficiency that surpass human capabilities. Women interested in cybersecurity can prepare themselves to stay at the forefront of this transformative wave by acquiring proficiency in AI and ML. They should obtain technical skills and cultivate
WHAT ARE THE CURRENT CHALLENGES AND BARRIERS THAT WOMEN FACE IN THE SECURITY INDUSTRY, AND HOW CAN THESE BE ADDRESSED TO CREATE A MORE INCLUSIVE AND DIVERSE WORKFORCE?
a comprehensive understanding of the diverse
Jo: In the security sector women face the same
applications of AI and ML in the cybersecurity domain.
issues they have always faced across the tech sector:
By remaining vigilant about the latest breakthroughs
a shortage of female role models and pay inequality.
and trends in these technologies women can ensure
It all starts with recruitment. Advertisements
they are well-equipped to contribute meaningfully.
for positions need to show flexibility to allow for
I S S U E 18
WOMEN IN SECURITY MAGAZINE
71
caring responsibilities. Professional development
centre of gender biases. It’s essential to showcase
opportunities need to be available for women even
and celebrate the achievements of women in the
when they are on maternity leave to ensure they do
industry, to provide role models and to challenge
not lose the skills they have attained. Recruitment
existing stereotypes.
processes need to be gender-blind to ensure bias is removed from candidates’ earliest interactions with
Women are still a minority in the security industry,
an organisation. This requires CVs to be presented
which can lead to feelings of isolation and of being
with no identifiers such as name, gender, photo or
an ‘outsider’. And underrepresentation is more
universities. Decisions can then be made without
pronounced in higher management and technical
gender bias. This approach helps to ensure inclusivity
roles. Encouraging more women to enter and stay
not only for women but for candidates from across
in the field through mentorship programs, employee
the diversity spectrum.
resource groups, networking opportunities and community organisations like ISACA can help reduce
Pam: The stark under-representation of women
this underrepresentation.
in both technical and leadership positions within cybersecurity can perpetuate the myth that women
Creating a workplace culture that promotes
are less inclined to enter technical fields, or less
professional interactions across genders in a
capable of fulfilling technical roles. The scarcity
respectful and comfortable manner is key. This
of visible role models and of women in leadership
includes implementing policies that prevent
positions further reinforces this misguided
and address harassment to ensure women
perception, contributing to the notion that women
feel safe and supported when developing
are somehow less ‘technical’. One impactful strategy
professional relationships.
for eliminating these stereotypes is engaging
provides invaluable hands-on experience and allows
WHAT RESOURCES AND SUPPORT NETWORKS ARE AVAILABLE FOR WOMEN PURSUING CAREERS IN SECURITY?
individuals to contribute to the development of
Jo: We are stronger together. My advice to women
cutting edge security tools and technologies, thereby
is: become a member of a professional body such
challenging preconceived notions about women’s
as ISACA and join the SheLeadsTech program where
technical abilities.
you can find networking opportunities to connect
women to become actively involved in open-source security projects. Participation in such projects
with other women who may be in a similar situation Networking within the female community in the
to yourself, and seek out a mentor, especially
security industry is essential, as is mentoring. ISACA
someone who has navigated and overcome career
offers a mentorship program for members who are
path hurdles. You will gain great support and
looking for one-to-one connections to give or receive
encouragement by talking with someone who is
professional development support at any stage in
willing to help you avoid some of the barriers they
their careers. Participation fosters new knowledge
faced. They can offer the benefit of their experience
and insights, new skills and network expansion.
on methods and strategies that have worked well throughout their career, and can be a great source of
Sushila: Women often confront stereotypes that
support and encouragement.
devalue their technical abilities and leadership
72
skills. I know I did, and I often wondered if I would
Pam: The ISACA Career Centre is a key resource
be successful in a career where I did not look like
for information security professionals and can
everyone else. The idea that women don’t ‘look’
assist those who are seeking to advance their
like cybersecurity experts or CISOs is often at the
IT and security careers. Members can post their
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
resumés online and receive email notification of new
equal opportunities for promotion, I go back to blind
postings. This service provides a convenient way to
recruitment. I would also say to employers: never
specify job criteria and target a job search for career
underestimate the capabilities of a busy women, one
advancement. Employers have come to recognise the
who has responsibilities outside the office. They will
ISACA Career Centre as a valuable source of qualified
surprise you. I know they have surprised me over
IT security managers and professionals.
the years.
Sushila: Non-profit, community-based organisations
Pam: Organisations must remain diligent in
provide a platform for women to network, connect
recognising and eradicating bias from their hiring
and learn from other women in the industry. These
and promotion processes. The implementation
women-centred organisations often host regional
of inclusive policies and practices is instrumental
events, workshops and conferences that are
in fostering a workplace that is truly equitable.
specifically tailored to the needs and interests of
Leadership development programs addressing
women in cybersecurity.
gender-specific challenges, flexible work policies and equal pay practices, measurable diversity goals and
ISACA, known for its comprehensive educational
supportive employee resource groups all add layers
and networking resources in IT governance and
of accountability and collaboration. Regular check-
cybersecurity, has initiatives like One In Tech, which
ins, feedback mechanisms and recognition programs
offer the best of both worlds by enabling members to
ensure ongoing commitment to gender equality.
establish connections with both women and men in
Such a comprehensive strategy can not only provide
the industry. One In Tech is particularly beneficial for
equal opportunities for women but can also cultivate
women who are looking to broaden their professional
a diverse and inclusive leadership landscape in the
network beyond gender-specific groups. Many ISACA
security industry.
chapters have events which celebrate women leaders and speakers.
Sushila: Organisations should provide awareness training for all employees—especially hiring managers
Industry prizes and awards for women in security
and executives—to recognise unconscious biases. In
serve to highlight their achievements and
doing so they are supporting women’s opportunities
contributions. These recognitions are essential for
to advance. Establishing employee resource groups
overcoming preconceived notions and biases. They
focused on minorities and different genders can
provide role models for aspiring professionals and
help to create a feeling of belonging and encourage
encourage women to excel in their careers.
people with different backgrounds to connect and share experiences. Providing women with a clear
HOW CAN WE ENSURE WOMEN HAVE EQUAL OPPORTUNITIES FOR LEADERSHIP ROLES IN SECURITY ORGANISATIONS, AND WHAT CAN BE DONE TO PROMOTE GENDER DIVERSITY IN LEADERSHIP POSITIONS? Jo: Awareness raising is incredibly important. Some people are seriously unaware of the issues women face because of unequal advancement opportunities. I think professional bodies have a role to play in this awareness raising by advocating for a gender diverse workforce. We know diversity of thought brings
and transparent leadership career path is invaluable. Such a path needs to be supported with leadership development programs, workshops and training focussed on developing both technical and soft skills. www.linkedin.com/in/jo-stewart-rattray-4991a12
www.linkedin.com/in/pnigro
www.linkedin.com/in/sushilanair
innovation. So why not walk down that path? As for
I S S U E 18
WOMEN IN SECURITY MAGAZINE
73
SIMON CARABETTA
I’LL MAKE MY OWN WAY – A DESIRE FOR A CHANCE TO SUCCEED by Simon Carabetta, Business Development Manager Cyber Security at Digital Resources Australia
Here’s to the ones that say yes and give us a shot.
least in the minds of my own Nonni when travelling
Thank you to those who provide the foot in the
from the old country to Perth in the 50’s and 60’s.
door and the opportunity to prove ourselves. These
Either way, they were all given a chance, and made
are the ones we should be celebrating the most in
their lives here, and I’ll be forever thankful to all four of
our industry.
them for that decision.
It has been close to five years now since I got my
I feel that there are so many parallels between this
first start in cyber security. I will always be forever
old Southern Italian quote and where I find myself,
grateful to a forward-thinking hiring manager, because
5 years later on, in my career. As a new recruiter,
although my application for the role came right out of
focusing solely on Cyber Security, I love the fact that
left-field, I was the successful candidate and given the
I get to help people break into their first ever security
chance of a lifetime. I haven’t looked back Since.
role or get their dream job. All they want is the chance, the chance to succeed, and they’ll make their own
There’s an old saying that comes from Calabria,
way. The same way I made my own way since day
Italy “Mintammicce impizzu ca pue largu minne
one – however, the opportunities that others can
fazzu Sule!”
help provide you, and the chances given, do continue if you prove yourself at first. For example, the best
Roughly translated, it means “Let me in just a little,
manager I have had so far in my entire professional
then I’ll make my own way!”
career, Dr. Ian Martinus, gave me opportunities in the form of “yes”, every time I came up with an idea
74
Mostly attributed to Calabrese who wanted a chance
for something. He had the faith that given some free
to make their way to America and start a new life, it’s
reign and armed only with my imagination, I could
a promise that, if given the chance to succeed, they’ll
create initiatives that would then provide further
take it, without asking for anything more. I like to think
opportunities to others as well as advocate for
that this same quote may have been uttered by, or at
better diversity in our industry. Initiatives such as the
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
Students of Cyber meetups run by CyberWest and the
in security, what brought you to this point where
West Coast Cyber podcast – amazing things that still
you’re now applying for a role and updating your CV
exist a couple of years later and are still going strong.
in the process? What value do you provide to the potential employer? You’re a cyber security aspirant
In the spirit of providing those opportunities and
who may just be the superstar that the company
giving a chance to those wanting to prove themselves
you’re applying for is looking for, so sell that!
in cyber security, here are 4 CV tips I’m providing to you lovely people wanting to kickstart your cyber
TIP 2: WHERE ARE YOUR ACHIEVEMENTS?
security career:
One piece of advice I regularly give out over the phone to clients is that they’re discussing so much of the
TIP 1: SELL YOUR WHY
tasks and responsibilities in their previous roles,
Not to go all Simon Sinek on you (well I’ve got half
but not talking about any of the success stories or
the name at least) but if you ever get the chance to
achievements. What major projects have you helped
read his breakout work, Start With Why, then I suggest
deliver? What changes or implementations were you
you get onto it ASAP. The TL;DR is companies who’ve
involved in? If you haven’t got much of a job history,
enjoyed long-term success are successful because
then relate these to your studies or even unrelated
they don’t sell a product, they sell an idea and a
jobs – talk about those Transferrable Skills!
purpose, and you should be doing the same.
TIP 3: SIDE PROJECTS I see roughly 20-30 CV’s a day, and out of these,
Make sure that you’re doing something on the side
I’m largely impressed by 1 or 2 of them. The reason
– get on GitHub if you haven’t already. If you’re not
being is that I see so many start with the headline
so technical, include anything that you do in your
“Objective” which is then followed by a really long
spare time. Here’s a hint – hiring managers love to
paragraph about what job the candidate is looking
get to know their candidates, and it will always be
for. Here’s the mistake – your CV is not supposed to
a discussion point in the interview that may take
demonstrate any objective, it’s to sell you as the best
some pressure off and let you speak candidly about
possible person in a crowd of potentially hundreds of
something you’re passionate about (besides security,
other candidates all vying for the same job. Start with
of course). If you volunteer, then do make mention of
WHY. Sell yourself by giving your purpose for working
this on your CV.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
75
TIP 4: LAYOUT IS KEY
no longer a name on a page to a potential hiring
Whether you’re using Word, Google Docs, Canva or
manager, but you’re now a face and a personality, with
whatever other platform, make sure that you use an
hopes and dreams and aspirations. They now know
eye-catching but simple layout. Don’t go extreme with
you’re interests and that you volunteer at the pet
colours and definitely don’t use fancy or complicated
rescue centre every Sunday and that your favourite
fonts. Keep it simple and keep it concise. Consistency
movie is The Princess Bride (my personal favourite)
is also key – I’ve seen many CV’s lately where different fonts and sizes are being used without
I recently gave a presentation to a group of graduating
reason and it makes it look like something I would
students from North Metro TAFE here in Perth, and
have conjured up in my Year 9 Desktop Publishing
one piece of advice I gave them towards the end
class. Please keep the length to 1-2 pages and be
was to get out of their comfort zone. That may seem
succinct in getting your point across. Getting too
easier said than done for most people, however it is
wordy won’t do any good as hiring managers tend to
certainly true if students, graduates and those coming
skim through and will lose interest if they need to read
across from another industry want to get their big
long paragraphs of information.
break. You’re going to get ahead and stand out in the crowd if you take the chance and go up and speak
CREATE THE OPPORTUNITIES
to somebody, no matter who they are or what their
Sometimes you might not always get the chance to
title is.
succeed or you may not even know the right people who can help provide it. That’s why networking and
To any of those students, graduates or people coming
getting your name out in the community is a really
across from another industry, I really hope you take
good idea. I’ve benefited from attending many various
heed of this article, whenever you get around to
industry networking events here in Perth over the
reading it. Channel that Calabrese Spirit and promise
years as it’s opened a lot of doors that I normally
that if you’re let in just a little, you’ll find your own way!
wouldn’t even know about. Extending your social and professional network is extremely important in Cyber Security as it is in any other industry, because you’re
www.linkedin.com/in/simoncarabetta
Interested In Working Together? Data Admin Services
Content
Media
Advertising
Events
Custom
Special Offer!! New client data admin programs 15% Off
The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.
We can execute anywhere in Australia, reach out today for an instant quote.
76
W O M E N I N S E C U R I T Y M A G A Z I N E
aby@source2create.com.au
source2create.com.au
charlie@source2create.com.au
J A N U A RY • F E B R U A RY 2024
It’s a bit
Inspiring today’s youth
techy
Stories. Fun. A sense of adventure. We use this philosophy combined with modern technology to inspire young girls into tech careers.
Discover more today. tcp4girls.com.au
EMMA PUDNEY
EMBRACING PURPOSE: MY JOURNEY TO INSPIRE YOUNG GIRLS INTO TECH by Emma Pudney, ex-CTO, catalyst for gender diversity in tech and founder Tech Career Paths 4 Girls
PART 1: FROM THE ASHES OF BURNOUT TO IGNITING PURPOSE
Taking a break was an opportunity for self-reflection.
As an executive in the tech industry my career
empowering women in tech, long suppressed under
seemed to flourish, but something was amiss. I felt
executive duties, resurfaced. I realised the critical
a growing weight, a toll on my wellbeing and on the
need to inspire young girls about tech careers well
It was during this respite that my passion for
deeper purpose behind my efforts.
before societal biases could take
It was not an overnight decision
root in their minds.
to shift from the corporate world to forge my path with Tech Career
Creating the ‘build your own tech
Paths 4 Girls; it was a culmination
career adventure’ platform was a
of years spent re-evaluating
turning point. It reignited my passion
my priorities.
and gave me a purpose-driven path. My goal? To inspire and guide young
Starting my career filled me with
minds into the world of tech, away
enthusiasm and aspiration, with
from stereotypes and limitations.
each milestone seeming to be an achievement. Yet, as responsibilities
78
This new chapter in my life is a
piled up, I sought meaning beyond promotions and
blend of thrilling challenges and profound fulfilment.
paycheques. Family commitments and increasing
I’m embracing the journey, sharing it authentically,
stress at work made me question the ultimate reason
recognising that life’s beauty lies in the experiences,
behind it all.
not just the outcomes. My aim is clear: to create
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
I N D U S T R Y
P E R S P E C T I V E S
opportunities for young girls across Australia to explore the possibilities in technology through Tech Career Paths 4 Girls.
PART 2: IGNITING PURPOSE FROM BURNOUT When I began conceptualising Tech Career Paths 4 Girls, I recognised there were significant challenges to achieving gender balance in the tech industry. 1. Lack of iconic role models: girls lack iconic female figures in tech, hindering their aspirations. 2. Unrelatable tech perceptions: the common perception of career techies as solitary individuals coding in bleak spaces alienates potential enthusiasts. 3. Early influences on career choices: by the time they enter high school, girls’ career paths are often influenced by media, stereotypes and family biases.
The outcomes give me the warm and fuzzies. Tangible boosts in interest towards tech careers and
4. Flawed introduction to tech: traditional methods of
transformed perspectives are just the beginning. One
introducing tech to girls fall short in engagement and
particular instance truly stands out. Initially, a girl
relevance, reinforcing stereotypes.
responded, “I imagine I would not be good at it” when asked about a tech role. Post-session, her answer
To address these challenges I designed Tech Career
changed to, “I am doing a good job.” Transformative
Paths 4 Girls as a transformative introduction to tech.
shifts like this vividly highlight the program’s
Our approach revolves around storytelling, interactive
profound impact.
adventures and puzzling challenges to captivate girls’ imagination.
Tech Career Paths 4 Girls is our unwavering stand against the dismal 1.6 percent of girls studying
The initial session presents a ‘build your own tech
technology. We strive to equip the future with
adventure’ platform, empowering girls to craft their
empowered women who find job security, intellectual
career destinies. They navigate through job options
stimulation and financial independence. If you share
such as product management, UX design and data
our vision, connect with us via tcp4girls.com.au and
science, interacting with role model videos and tech
be part of this transformative journey.
trivia. This smashes the ‘coding-only’ stereotype. Subsequent cyber mystery workshops redefine conventional sessions. Students connect with a
www.linkedin.com/company/tech-career-paths-4-girls
www.youtube.com/channel/UCuBrVJSsDcEMxgGQ-kMq9MQ
tech-savvy female expert who shares her own tech journey, making it a human experience. Then they delve into a hands-on cyber mystery activity, finding clues and solving puzzles; all designed to ignite their tech curiosity.
I S S U E 18
www.instagram.com/tcp4g
tcp4girls.com.au
WOMEN IN SECURITY MAGAZINE
79
J O B B OA R D VULNERABILITY MANAGEMENT SPECIALIST | TECHSPACE CONSULTING LIMITED FULL TIME
AUCKLAND
NEW ZEALAND
ABOUT THE ROLE Our stellar client is seeking a skilled and proactive Cybersecurity Vulnerability Management Specialist to boost their organization's defense against cyber threats. In this pivotal role, you will be responsible for identifying, assessing, and mitigating potential vulnerabilities across their systems, networks, and applications. Your primary focus will be on ensuring the resilience and integrity of their information assets through comprehensive vulnerability assessments and penetration testing. SKILLS AND EXPERIENCE • Proven experience in cybersecurity vulnerability management and penetration testing. • In-depth knowledge of cybersecurity best practices, tools, and technologies. • Strong analytical and problem-solving skills. • Excellent communication and collaboration abilities. • Demonstrated ability to implement effective remediation strategies. • Familiarity with regulatory requirements and cybersecurity frameworks. • Ability to identify gaps in the existing setup or process and able to come up with a plan to resolve it
APPLY HERE
IDENTITY AND ACCESS MANAGEMENT (IAM) SPECIALIST | TECHSPACE CONSULTING LIMITED FULL TIME
AUCKLAND
NEW ZEALAND
ABOUT THE ROLE As an IAM Specialist, you will be responsible for designing, implementing, and managing the identity and access management framework and solutions in alignment to the Information Security Strategy. You will play a critical role in ensuring the security and integrity of our systems and data by effectively managing user identities, access controls, and authentication mechanisms. SKILLS AND EXPERIENCE • 5+ years of experience in IAM domain • Relevant IAM certifications • Proven experience in designing and implementing IAM solutions in complex enterprise environments. • Strong understanding of identity and access management principles, standards, and best practices. • Familiarity with IAM technologies and tools, such as identity providers, directory services, access management, and federation services. • Experience with authentication protocols and mechanisms, including SAML, OAuth, OpenID Connect, and MFA.
APPLY HERE
80
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
CYBERCX ACADEMY | CYBERCX FULL TIME
AUSTRALIA
ARE YOU AUSTRALIA’S NEXT TOP CYBER SECURITY EXPERT? The CyberCX Academy is a paid, permanent full-time training opportunity designed to launch your career in cyber security. No prior experience is necessary. If you want to embark on a rewarding, meaningful career, then you’re in the right place. The CyberCX Academy program provides you with a blend of formal training and practical onthe-job experience alongside a 1,300-strong workforce of cyber security professionals. WHO ARE WE LOOKING FOR? You don’t need to be a cyber expert. We are on the lookout for people who want to learn and grow in a constantly evolving industry that’s combating criminal activity. We’re more interested in who you are, where you have come from, and where you want to take your career. If you’re new to this world, we’ll teach you everything you need to know on the go. ACADEMY PATHWAYS: Consulting For the people who thrive on client-facing relationships, tech talk and advice You will be working with our clients to identify their security needs and provide advice on cyber best practices. Your advice will help protect organisations from cyber threats and empower them to thrive in a changing world. Consulting practices: • Cyber Capability, Education and Training • Governance, Risk and Compliance • Phriendly Phishing • Strategy and Consulting Technical For those who want to get their fingers dirty in code and tech tools You might be developing and implementing security solutions, or our could be testing solutions, monitoring client systems, providing advice on system vulnerabilities or investigating real cyber incidents. Technical practices: • Cloud Security and Solutions • Cyber Intelligence • Digital Forensics and Incident Response • Identity and Access Management • Managed Security Services • Network and Infrastructure Solutions • Security Testing and Assurance
APPLY HERE
I S S U E 18
WOMEN IN SECURITY MAGAZINE
81
J O B B OA R D INFORMATION SECURITY OFFICER | OLIVER JAMES FULL-TIME
ZURICH
CONTRACT
ABOUT THE ROLE Oliver James is currently recruiting an interim consultant to join one of our clients based in Zurich as an Information Security Officer. In this role, you will support the permanent team in maintaining and ensuring compliance with the required security standards expected of a professional services business. KEY RESPONSIBILITIES Your key responsibilities will include creating, implementing, and overseeing IT security guidelines, security concepts, and system architectures. Additionally, you will continuously develop IT security management, assess operational IT risks, and design/implement security controls. THE SUCCESSFUL PROFILE • 5+ years of experience in an information security officer or CISO role. • Experience in ISMS and the ability to independently formulate and implement new policies and procedures. • Hold relevant certifications such as CISM, CISSP, CCSP, CASP+, CRISC, CISA, ISO/IEC 27001. • Proficient in German and English. • Fantastic communication, analytical, and team player skills.
APPLY HERE
HEAD OF CYBER SECURITY | CARDIFF UNIVERSITY FULL TIME
CARDIFF
ABOUT THE ROLE The successful candidate will strategically and operationally lead and manage the University’s Cyber Security function, motivating a team of security professionals who ensure the security of the university’s complex IT infrastructure. Drawing on the university’s academic expertise in Cyber Security research and education, the successful candidate will be the technical lead for the continuous development and implementation of a programme of work to improve and strengthen cyber security controls. DESIRABLE CRITERIA • Qualification in Cyber Security, such as CISSP. • Direct University IT experience and / or other public sector experience but ideally with some non-public service sector exposure. • Proven management experience of delivering IT Security technologies, policies, processes and services to ISO27000, NIST or Cyber Essentials standards.
APPLY HERE
82
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
ADVISOR, CYBERSECURITY | AIR CANADA FULL TIME
ABOUT THE ROLE The Advisor, Cybersecurity will be working in a fast paced and innovative environment supporting the overall security posture of Air Canada’s technology environment. Air Canada’s cybersecurity systems are foundational to protecting the data and systems that allow its customers to fly safely. The Advisor, Cybersecurity role acts as a security subject matter expert and provides guidance concerning IT risks and security assessments for Air Canada and its affiliates. He/she will evaluate Air Canada’s existing security systems to determine potential cybersecurity risks, provide inputs on security requirements for personal, commercial and financial data as well as the operation of Air Canada IT networks and infrastructure. Cybersecurity threats continue to evolve, and the Cybersecurity team will evolve with it. RESPONSIBILITIES • Contribute to the development documentation, monitoring and maintenance of information security standards, policies and protocols to ensure organisational infrastructure, data and resources are protected from unauthorised and inappropriate use or access. • Coordinate with operational groups and business units to set up and implement various cybersecurity controls and measures. • Review and offer security recommendations for architecture diagrams. • Lead the delivery of cyber capabilities for Air Canada. • Advise on meeting compliance with information security policies and procedures. • Provide expertise in the definition, selection and implementation of IT Security related controls to the IT Department • Provide security advisory services by conducting tests on a current system to determine vulnerable areas. • Generate security reports for IT administrators and business managers to evaluate the efficacy of security systems and policies. • Track risks using the Air Canada GRC tool (Archer). • Support the business initiatives, while making sure any Cyber specific risk introduced is properly managed. • Identify Cyber risks, communicate and develop “best practice” solutions, and implement mitigating controls consistent with company strategy. • Plan, coordinate and oversee activities related to the design, development and integration of information systems, operations systems and reporting systems in a business or security or risk context. • Introduce new processes and ensure that gaps in the aforementioned items are identified and addressed ahead of time. • Implement and manage governance around business partner/security management both internally and externally. • Work with the vendor’s teams (business and technical) to establish and review policies and IT direction. • Perform project reviews to ensure that they align to Air Canada’s business/ information security requirements. • Ensure that the company’s internal technological processes and services comply with community expectations, laws, and regulations for privacy, security, and social responsibility. • Represent the organization and take an active participation on different IT business or security airline specific forums. • Supporting the leadership team on strategic initiatives specific to the respective portfolio.
APPLY HERE
I S S U E 18
WOMEN IN SECURITY MAGAZINE
83
Need Event Speaker Services
Tell us more about what YOU need.... Need an MC or host? Looking for a keynote speaker? Want to get matched with industry expert speakers? Need speaker inspiration/ideas? Looking for presenters or analysts? Need your events speaker lineup managed end-to-end?
REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.
With:
aby@source2create.com.au charlie@source2create.com.au source2create.com.au
STUDENT IN SECURITY SPOTLIGHT
Safa Baalfaqih is a full-time Saudi student majoring in information security. She was born and raised in the United Arab Emirates. SAFA BAALFAQIH Bachelor of Information Security Student at the United Arab Emirates University
What exactly is the course you are undertaking and how long have you been doing it?
experiences. As a woman pursuing a cybersecurity
I am in my fourth year at the United Arab
representation in the field. However, rather than
Emirates University. I am pursuing a bachelor’s
feeling disadvantaged, I have found empowerment
degree in Information Security with a minor in
and the motivation to excel.
education, I’ve noticed a lack of women’s
Artificial Intelligence.
uncertain about which major to choose and felt
What about specific cybersecurity qualifications such as those offered by (ISC)², CompTIA and ISACA? Have you gained, or do you plan to gain any of these, if so which ones and why?
dissatisfied with the presented options. During this
Participating in regional capture the flag
time I stumbled upon a YouTube video featuring
competitions and enhancing my skills through self-
Kevin Mitnick, one of the world’s most renowned
study and practicing for certifications like CEH and
hackers, which sparked my interest in cybersecurity.
CompTIA Security+ have been vital to my academic
Exploring the realm of cybersecurity, I found it more
growth. Post-graduation, I plan to apply for these
fascinating with every piece of research I undertook.
certifications to further boost my qualifications. In
Eventually, I decided to make cybersecurity my
the ever-evolving field of information technology,
primary choice for a major.
especially in cybersecurity, I believe continuous
When do you expect to complete it, and how did you get there? As I approached the end of high school, I was
learning to be essential. While a bachelor’s degree
What reaction did you get from family and friends when you decided to pursue cybersecurity?
serves as an excellent foundation, I recognise that
Although my decision was met with confusion from their support has been unwavering throughout my
And finally, having come this far, do you have any regrets. If you had your time again, would you take a different path?
academic journey. Upon being accepted into the
Reflecting on my journey, I have no regrets about
InfoSec program, I approached it more as a hobby
clicking on that YouTube video out of curiosity. It led
than formal study. Learning about something I was
me to one of the best decisions of my life. Moving
passionate about made the process enjoyable,
forward, I am committed to staying up to date with
even though I encountered challenges in subjects
the latest trends and advancements in the industry.
friends and family who were unfamiliar with the field,
skills are the primary key to success.
like cryptography.
And of course we’d like to hear about the specifics of your current course. Please give us a few details of what you are studying. What do you enjoy? What do you find challenging? What would you like to see done differently?
www.linkedin.com/in/safa-baalfaqih-117483218
I particularly enjoyed practical topics such as network security, because I prefer hands-on learning
86
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Farkh Leka Hashimy is a Dean’s List Computing Security student at RIT Dubai. She is an executive member of the university’s IEEE Student Chapter and Technosphere technology club. She is also a former executive member of the volunteering club, Lend A Hand, which she still actively collaborates with. In her free time, Farkh Leka is a hobbyist illustrator, polyglot, poet, and gamer. FARKH LEKA HASHIMY Computing Security Student at RIT Dubai
Were you inspired by cybersecurity in high school, if so, how? Or was it a later employment role that led you there? What reaction did you get from family and friends when you decided to pursue cybersecurity?
instead of in traditional employment. As such, I firmly
Throughout high school I found that, unlike most of
It is a massive source of motivation and inspiration
my peers who had chosen a path and were working
for me to do something meaningful knowing the
towards it, I did not have any specific field I was
strength of the women in my country and the
passionate about. Still, I knew I wanted something
talent and potential I hope they will one day be able
interdisciplinary because that fitted my nature.
to realise.
I seldom find satisfaction in pursuing just one
It takes much more than cybersecurity expertise to be a good cybersecurity professional. In most roles people skills are essential. There is also the ability to be creative, to ‘think outside the box’. Do you plan to undertake, or are you already undertaking, training in disciplines other than cybersecurity to support your career plans?
thing, so having joined a field at the meeting point of psychology, governance, technology and, most importantly humanity, has been a blessing from God. And I find it quite fun that people are impressed when I tell them I am in cybersecurity!
When you complete your course and gain your qualification, what next? Do you have a clear vision of a role it will help you attain, or, if you are already in work, is it something you feel will help you do your job better and, hopefully, gain a promotion?
acknowledge the privilege and responsibility I have been given as an Afghan woman to make something meaningful out of these blessings.
My plan is to gain some industry experience as a student and hopefully land a full-time job as a cybersecurity analyst. The goal from there on is to gain experience, qualifications, training and more to develop into a well-rounded and truly effective
The mere mention of my major opens the door to
problem-solver who has not only the insights of a
important conversations with people who do not
cybersecurity-trained individual but also insights
realise the omnipresent nature of cybersecurity in
into law, software engineering, mathematics
today’s world. It builds the foundations that enable
and business.
the connections and communications we all enjoy. Not only that, but cybersecurity also presents
I recognise the importance of building such skills
me with opportunities to empathise with the real
early on. Thus I have worked on projects related to
problems people face about their privacy, and their
software development. Specifically, I have some
fears of surveillance.
experience with front-end development of websites and mobile applications, though I am far from
Please give us a brief rundown of your career to date: the jobs you have had, where and when, in cybersecurity and other fields. Please mention anyone who has been particularly influential in your journey.
proficient. The key is to stay consistent with the
Upon graduating from high school I had the freedom
Beyond this, I have also completed a course on Agile
to invest my time in learning new skills independently
development. Presently, my focus aside from my
I S S U E 18
learning. Additionally, I have some experience with machine learning, but I will be building more on that through Kaggle and FreeCodeCamp (a great resource for people who are starting programming).
WOMEN IN SECURITY MAGAZINE
87
FARKH LEKA HASHIMY
degree is an ethical hacking program I am working
Other courses have covered networking theory and
on. The earlier I expose myself to a lot of learning, the
labs, systems administration and cyber policy and
easier it will be for me to polish those skills later.
law. The cyber policy course stood out as being particularly enjoyable. Additionally, unlike the usual
What about specific cybersecurity qualifications such as those offered by (ISC)², CompTIA and ISACA, Have you gained, or do you plan to gain any of these, if so which ones and why?
syllabus of a cybersecurity degree, our program includes plenty of mathematics. In my opinion, this is a great strategy for teaching students problemsolving skills that will be critical when they enter the workforce.
I think it is evident from my pursuits that I cannot
the entry-level skills of a professional well before I
Almost every aspect of cybersecurity is evolving rapidly. Do you feel your course is doing enough to keep up? Are there topics you would like to see covered, or topics you think should be omitted?
have the urgency of landing my first job. I want to be
No program is perfect, and education often struggles
prepared ahead of time. At the same time, I want to
to keep up with the pace of development. It would be
make sure I don’t overspecialise before I allow myself
nice to see courses related to quantum computing
to explore the field.
and the cutting edge of cybersecurity tools in
be satisfied with doing the bare minimum. So, I hope to complete multiple certifications throughout my degree. For example, the first one in line is the CompTIA Security+. I want to affirm that I have all
addition to the foundation they are building for us.
And of course we’d like to hear about the specifics of your current course. Please give us a few details of what you are studying. What do you enjoy? What do you find challenging? What would you like to see done differently?
We do have a cyber analytics and machine learning
Life as a student at RIT Dubai so far has been
and system admin courses to be in the first and
fruitful. That’s not to say it does not have challenges.
second semesters respectively. Still, there are
Certainly, the challenges of a university degree are
many opportunities for students to expand their
there every day no matter what course I am taking,
learning outside of courses, such as university and
but the support and motivation I have found in my
industry collaborations that offer students training
peers and faculty make it all worthwhile.
and seminars.
course. However, I think the program would benefit from expanding these components. Additionally, I find the course moving slower than I anticipated. I would have expected the networking
Beyond this, I have thus far completed three programming courses as part of my degree and explored four programming languages. The programming courses also cover networking, which in my opinion is a great inclusion. I find programming to be challenging but at the same time I gain great satisfaction from writing working code that runs perfectly.
88
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
S T U D E N T
I N
S E C U R I T Y
S P O T L I G H T
Please tell us about your experience of being a woman studying cybersecurity. Chances are you are in a minority. Do you feel disadvantaged? Have you encountered sexism or misogyny? Do you feel your institution does sufficient to address such issues?
And finally, having come this far, do you have any regrets. If you had your time again, would you take a different path?
Overall I find the experience of being a university
my only regret is the feeling of being an amateur
student in Dubai quite pleasant. I have thankfully yet
and hesitating to put myself out there and under
to meet colleagues or higher-ups who put me down
pressure. The few projects I have worked on would
for reasons related to my identity as a woman, a
have benefited greatly had I believed in my abilities
Muslim, or a hijabi. It has been quite the opposite.
just a little bit more. Additionally, I would have found
Many of the individuals I have encountered have
more freedom to begin exploring earlier and set
been highly supportive and encouraging, particularly
myself on the journey ahead of schedule. It may very
because of the identity I present as an Afghan
well be that the time I took to feel confident allowed
woman. I cannot speak for all female students
me this realisation. So I do feel grateful for my unique
and other women on campus, but I have yet to
journey regardless of the regrets.
I think the experience overall has been positive. I feel the education I am gaining and the work I will be doing are both quite meaningful and have a great potential to impact people in general. I think
experience any particularly discriminating behaviour. I have found all my peers, male and female alike, to be motivated and hard-working individuals with
www.linkedin.com/in/fhashimy
a common vision of excellence and success. I look forward to cultivating a similar environment when I enter the industry and surround myself with likeminded, growth-oriented professionals.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
89
Felicity Le is an intelligence practitioner, and is studying a double degree in law and justice at Queensland University of Technology. She has a deep passion for international law and national security, and aims to practice in these fields post graduation. When she isn't interpreting legislation or analysing case law, you will find her powerlifting or curling up with a thriller spy novel. FELICITY LE Bachelor of Laws (Honours) and Bachelor of Justice Student at Queensland University of Technology
What exactly is the course you are undertaking? How long have you been doing it? When do you expect to complete it? And how did you get there?
I have always had a deep interest in humanities.
I am undertaking a double degree with a Bachelor
relatable and enjoyed using the critical thinking
of Laws (Honours) and Bachelor of Justice (major
skills, problem‑solving skills and writing skills
in Policy and Governance). I expect to complete this
these subjects required: skills that are necessary
double degree in the middle of 2024. I started off
for an intelligence practitioner. My parents were
studying the Bachelor of Justice as a single degree
very supportive of this pathway as they share
but transitioned into law school after realising how
these passions.
However, my passion for intelligence and national security arose during the early years of my law and justice degree. I found certain topics very
much the two fields complement each other, and realising it was important I knew how laws were made, and understood how to apply them in practice.
Please give us a brief rundown of your career to date: the jobs you have had, where and when. And please, mention anyone who has been particularly influential in your journey.
When you complete your course and gain your qualification, what next? Do you have a clear vision of a role it will help you attain, or, if you are already in work, is it something you feel will help you do your job better and, hopefully, gain a promotion? I aspire to work in government intelligence after
My first professional position was as a practicing
graduation. My current role in private intelligence
intelligence officer, and it is still my role now. I
has given me a head start in using the skills required
currently work as an investigative officer at a private
of an intelligence officer working in the public
investigations and mercantile firm. My family,
service, including critical thinking, problem solving
especially my parents, who were immigrants, have
and effective communication. The best thing about
been very influential in my intelligence journey.
this field is that intelligence is not only a career
Throughout my childhood, I could see the copious
pathway but is a skill in its own right. Once you have
amount of work and effort my parents put in to
acquired a baseline of thinking outside the box,
ensure my siblings and I grew up well prepared
reading between the lines and communicating your
for life. Now I am older, I can see the trauma that
thoughts clearly, you can use these skills in any
was inflicted not just on my family but on the
intelligence role. For me, that means working in the
community as a whole. Those experiences led me
public service.
onto my current path: ensuring future generations do not have to experience such tragedies and generational trauma.
Were you inspired by intelligence in high school, if so, how? Or was it a later employment role that led you there? What reaction did you get from family and friends when you decided to pursue intelligence?
90
W O M E N I N S E C U R I T Y M A G A Z I N E
It takes much more than intelligence expertise to be a good intelligence professional. In most roles people skills are essential. There is also the ability to be creative, to ‘think outside the box’. Do you plan to undertake, or are you already undertaking, training in disciplines other than intelligence to support your career plans?
J A N U A RY • F E B R U A RY 2024
S T U D E N T
I N
S E C U R I T Y
S P O T L I G H T
In the role of an intelligence officer, communication
In saying that, studying at law school is not easy.
skills and critical thinking skills are essential. Whilst
The most challenging aspect of my degree is
I regularly use these skills at university and in my
balancing the workload with my job, my internships
professional role, I would love to enhance them
and volunteering commitments. I am grateful for all
further: there is no limit to learning. In particular, I
these opportunities, but I would also like to see more
would like to practice the skill of human intelligence
support for students entering the intelligence field,
where I interact with people and stakeholders. I aim
particularly because most internships and paid roles
to become a practitioner, and practical skills such
are advertised only through word of mouth.
as effective verbal communication are essential to succeed in this role.
And of course we’d like to hear about the specifics of your current course. Please give us a few details of what you are studying. What do you enjoy? What do you find challenging? What would you like to see done differently?
Almost every aspect of intelligence is evolving rapidly. Do you feel your course is doing enough to keep up? Are there topics you would like to see covered, or topics you think should be omitted? I believe that universities in Australia should offer more intelligence related courses. It is a big market and interest is growing rapidly amongst law, justice
With my law degree, I had the option to choose
and criminology students. Having this formal
several law electives. With this flexibility, I chose
knowledge ensures students enter the intelligence
electives relevant to my future role including
workforce with a baseline level of knowledge and
introduction to international law, advanced public
skill, rather than being thrown in the deep end not
international law, and the law and ethics of war.
knowing where to start. This is especially the case given that internships or entry level intelligence roles
I have supplemented these electives with the
can be difficult to find, and applicants for some roles
subjects I have chosen for my justice degree. I chose
require certain skills in order to be considered.
subjects relating to political violence and terrorism,
perspective for my law degree and from a theoretical
Please tell us about your experience of being a woman studying intelligence. Chances are you are in a minority. Do you feel disadvantaged? Have you encountered sexism or misogyny? Do you feel your institution does sufficient to address such issues?
perspective for my justice degree. As a future
Fortunately, I have not encountered any sexism or
intelligence practitioner, I believe it’s very important to
misogyny. The practical nature of intelligence work
apply your knowledge and skills in your role but to do
requires a focus on the skills a person has to offer,
so in a lawful way, and I am very fortunate to be able
regardless of their gender. However, there are times
to practice both skills at present.
where I do feel like the odd one out, because I am
political practice, people power and protest. What I have found most satisfying about studying for this double degree was being able to study topics relating to national security from an international law
the only woman and the youngest person at certain events. Whilst I enjoy networking with people from all
I S S U E 18
WOMEN IN SECURITY MAGAZINE
91
FELICITY LE
life experiences, or are from a generation other than
And finally, having come this far, do you have any regrets. If you had your time again, would you take a different path?
mine.
I have no regrets thus far, although I have been
walks of life, it is difficult to find common ground with other practitioners because they do not have similar
disappointed about the lack of support at times. Having said that, I have observed a growing number
Whilst this did teach me to be independent, it was
of students, including female students, showing a
disheartening to see my fellow university students
deep interest in intelligence over the years. Now, I can
having greater opportunities to engage with mentors,
attend networking events and enter the workforce
get regular placement offers and attend dedicated
knowing I can work with people just like me.
career workshops.
Educational institutions, especially universities—the ‘ivory towers’—are often seen as being out of touch with the real world. If you are not already immersed in the broader world of intelligence you will be part of when you complete your study, what are you doing to prepare yourself for that transition.
As a result, I try to use my platform to reach out to other like-minded students and offer them the mentorship and guidance I lacked when I was starting out in my intelligence career.
www.linkedin.com/in/felicity-le-4a7b01155
There were three extra-curricular activities that helped me get a headstart with my career. Firstly, as much as possible, I attended networking events both in-person and online. Most positions in intelligence, particularly at entry-level, are not publicly advertised, rather news of them is spread through word of mouth. Secondly, I volunteered for like-minded organisations. I found this particularly useful because such organisations are often run by industry professionals with years of experience and many networks. Thirdly, I applied for internships or placements with my university. I am also a board member of the Australian Institute of Professional Intelligence Officers and a member of the QUT School of Justice advisory committee where I advocate for students studying intelligence.
92
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Need Data Admin Services
Tell us more about your data Need Data appending services? Need database admin cleaning Data enrichment services
Data Entry Admin services Data Verification services
LET US HELP YOU OVERCOME YOUR BUSINESS DATA CHALLENGES PARTNER WITH A QUALITATIVE FAST-WORKING TEAM Our team understand the importance of time and efficiency when it comes to data projects.
With:
aby@source2create.com.au charlie@source2create.com.au source2create.com.au
LISA ROTHFIELD-KIRSCHNER Author of How We Got Cyber Smart | Amazon Bestseller
The digital adventure of Olivia and Jack Twelve year old twins Olivia and Jack love hanging out together as well as with their group of friends. They spend much time together on the weekends and after school, and have many shared interests; from Lego, chess and basketball to online gaming. They are 21st century digital citizens and have grown up with a wide array of connected devices around them. Their parents are modern too, and quite tech-savvy. They also understand the importance of online safety, especially for Olivia and Jack. They had already set up parental controls on both Olivia’s and Jack’s devices after having conversations with them about why this is necessary in the modern world. Limiting and restricting online access is one way to reduce Olivia’s and Jack’s exposure to the dangers of the internet, and enable their experience online to be as safe as possible, but still enjoyable and fun. One day after school Olivia and Jack were sent a link from a school friend to a brand new online game called Sugarsnap. All the children were talking about it at school, and lots of them were playing it on the school bus. Olivia and Jack could not wait to try it out. They clicked on the link to try and download Sugarsnap but got an alert advising them they could not access the game. “Access Denied!” the screen read. They were puzzled and somewhat annoyed. Their parents overheard them complaining to each other and came over to see what they were talking about. “This is totally unfair Mum” Olivia exclaimed. In a calm, reassuring voice their mother explained: “Remember, we’ve set up these controls for your safety. The internet can be a fun place, but it also has its dangers, and this new game, Sugarsnap, is not appropriate for 12 year olds. It’s rated M and is suitable for 15 year olds and over. It has some violent content that we don’t want you exposed to.” Olivia and Jack understood their parents’ concern but felt their digital wings had been clipped. They felt they were missing out on a new game everyone
94
W O M E N I N S E C U R I T Y M A G A Z I N E
was talking about. So, they decided to find a way around the limitations. Olivia, who was very tech savvy, thought of using a virtual private network or VPN to bypass the parental restrictions on their device. Jack suggested they research and understand the implications first. They spent the next few days learning about VPNs, online safety and the importance of digital ethics. They also spoke to their friends about Sugarsnap and one of them said they had stumbled into a room in the game that was quite scary and gave them nightmares. At that point Olivia and Jack decided to talk to their parents again. They really wanted to play the game but understood the restrictions were there to protect them from harmful content and dangers they might not anticipate. They discussed what they had learnt about VPNs and proposed a compromise with their parents. They asked if their parents would whitelist the Sugarsnap ‘Green World’ area in the parental control software, making it available for them to use. (The Green World area is safe for children under 15). Impressed by their responsible attitude Olivia’s and Jack’s parents agreed, but reminded them: “The internet has safe and dangerous parts, always be aware of where you are, what you are doing and who you are engaging with.” Olivia and Jack enjoy their digital adventures, and now they always remember their parents’ advice. They learnt that limitations are not just barriers but guides to keep them safe in the vast digital world so they can explore safely and responsibly. www.linkedin.com/company/how-we-got-cyber-smart
facebook.com/howwegotcybersmart
twitter.com/howwegotcybers1
J A N U A RY • F E B R U A RY 2024
Recom mend ed by F amily zone
How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary school-aged children.
READ NOW
WOMEN IN SECURITY MAGAZINE CONTRIBUTORS 01
02
1. BEVERLEY SHIMMIN
Program Manager, Cybersecurity Program at Curtin University
2. ELIF CANSU GÜLEÇ
Cyber Security Consultant
03
04
3. ROBYN FRYE
Vice President, Cybersecurity GRC at Workday
4. EJONA PRECI
Principal Manager - Cybersecurity Risk at FREENOW, President - Women in Cybersecurity (WiCyS) Germany
05
06
5. MEAGHAN BRADSHAW
Senior Cyber Consultant on Microsoft Incident Response
6. MARIA TERESA JIMENEZ SALINAS
Senior Information Security Officer at Citi
7. NATASHA TOWNER
Deputy CISO and Security Operations Lead
07
08
8. AYÇA GÜZÜNLER
Director of Security, Strategic Programs & Business Operations at Booking.com
9. COLETTE HANLEY
Vice President, Technology Risk at Checkout.com
09
10
10. MARINA GISTAU
CEO Nudgy Consulting | Change Manager Cybersecurity
11. EMILLY RICARTE
Project and Event Management Specialist
11
12
12. CRAIG FORD
Head Unicorn – Cofounder and Executive Director, Cyber Unicorns. Australian Best Selling Author of A Hacker I Am, Foresight and The Shadow World book series. vCISO – Hungry Jacks, Wesley Mission, PCYC and Baidam Solutions
13. KAREN STEPHENS
CEO and co-founder of BCyber
13
14
14. NEHA DHYANI
Cyber Security Expert (CISSP, CCSP, CISM, MITRE ATT&CK Certified Defender) Senior Security Consultant at Nokia Solutions & Networks
96
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
15
16
15. ANJALI VARGHESE
Cyber Security Specialist (CISA, CISM, ISO 27001 Lead Implementer) Cyber Security Specialist, Grant Thornton
16. LISA VENTURA
Founder, Cyber Security Unity
17
18
17. LISA JANE YOUNG
APAC Intelligence Officer, FS-ISAC
18. MELANIE NINOVIC
Principal Consultant at ParaFlare
19
20
19. JO STEWART-RATTRAY
ISACA’s Oceania Ambassador and Chief Security Officer of Silverchain Group
20. PAM NIGRO
ISACA Board Director and Vice President of Security and Security Officer at Medecision
21
22
21. SUSHILA NAIR
Vice President of ISACA Greater Washington, D.C. Chapter and Vice President, North America Cybersecurity Practice Lead, Capgemini
22. SIMON CARABETTA
23
24
Business Development Manager - Cyber Security at Digital Resources Australia
23. EMMA PUDNEY
ex-CTO, catalyst for gender diversity in tech and founder Tech Career Paths 4 Girls
24. SAFA BAALFAQIH
25
26
Bachelor of Information Security Student at the United Arab Emirates University
25. FARKH LEKA HASHIMY
Computing Security Student at RIT Dubai
26. FELICITY LE
27
Bachelor of Laws (Honours) and Bachelor of Justice Student at Queensland University of Technology
27. LISA ROTHFIELD-KIRSCHNER
Author of How We Got Cyber Smart | Amazon Bestseller
I S S U E 18
WOMEN IN SECURITY MAGAZINE
97
THE LEARNING HUB INTRODUCTION TO CYBER SECURITY This course offered by OpenLearn is suitable for individuals looking to get a basic grounding in cyber security. Participants will learn how to protect themselves online by learning how to recognise cyber threats, understanding the concepts of viruses, trojans and malware as well as how to mitigate the risks, considering cryptography and network security. It is an introductory level course, requiring no previous knowledge of computer security.
VISIT HERE
ADVANCED DIPLOMA IN CYBER SECURITY In this program, students can inherit valuable skills and knowledge in information security and IT security. Some vital foundational subjects include ethics, information security, database management, programming and scripting. Graduates from this program will be skilled in implementing robust security practices for mitigating security threats and responding immediately to security breaches.
VISIT HERE
CYBER SECURITY BEGINNER CERTIFICATE This course offered by the UK PD Academy provides participants with the latest knowledge to identify, prevent and evaluate cybercriminal activities. While this course assumes no prior expertise in cyber security, its target audience is managers in IT business firms, suggesting that some industry experience would be beneficial.
VISIT HERE
MASTER OF CYBERSECURITY AND THREAT INTELLIGENCE The University of Guelph offers one of the best cyber security courses in Canada with a distinctive cutting-edge curriculum. It provides students with a demanding and progressive career in cyber security, digital forensics and cyber threat intelligence. Graduates of this master’s program can become experts in threat intelligence, security analysis and design, intrusion prevention and security incident. Moreover, they can also learn vital subjects such as penetration testing, malware analysis, digital forensics and cryptography engineering.
VISIT HERE
98
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
FEATURING FREE SECURITY TRAINING RESOURCES THAT ARE AIMED AT INCREASING SECURITY AWARENESS AND HELPING PEOPLE BUILD AND UPSKILL THEIR SECURITY SKILLS.
CERTIFIED INFORMATION SECURITY MANAGER One of the most coveted credentials in cyber security is the CISM, awarded by the ISACA, a global association offering a range of qualifications to security professionals. The CISM provides a globally accepted standard of information security across IT governance, information systems audit and information security roles.
VISIT HERE
CYBER ESSENTIALS The National Cyber Security Centre (NCSC) offers several UK government-backed programmes under their cyber security scheme. The first, Cyber Essentials, is a certification awarded to organisations and businesses rather than individuals, to help protect them against common cyber threats and win the confidence of their clients.
VISIT HERE
PG DIPLOMA IN INFORMATION SECURITY AND CLOUD COMPUTING Offered by NIELIT, one of the cyber security best colleges in India, this is a 24-week PG Diploma in Cyber Security that covers information security & cloud computing concepts, cloud development & security. To be eligible for this PG Diploma in cyber security course, aspirants must have prior undergraduate qualifications in either B.sc/M.sc./B.Tech/ MCA/BCA or a similar equivalent. This cyber security PG course in India can help you tread a bright career path in cyber security.
VISIT HERE
ADVANCED & INTERMEDIATE CERTIFICATIONS FOR CYBER SECURITY/IT PROFESSIONALS The CompTIA Security+ certification is globally recognised, signifying competence in comprehensive cyber security skills, essential for core professions in the IT sector. For specifically cyber security roles, earning this certification is usually a prerequisite. It is held in particularly high esteem in the US: the US Department of Defence compels all employees to be certified, whether or not they work in the IT department.
VISIT HERE
I S S U E 18
WOMEN IN SECURITY MAGAZINE
99
THE LEARNING HUB ONLINE CYBERSECURITY ANALYTICS This cybersecurity online course is designed to teach students the skills they need for a career as a security analyst, consultant, or a tier 1+ SOC analyst. This intensive program covers network and system administration, strategy and analyst for threat intelligence, security intelligence and event management, and more. The program culminates with a capstone project that pulls together many of the skills learned in the course.
VISIT HERE
NEW ZEALAND DIPLOMA IN CYBERSECURITY (LEVEL 6) The New Zealand Diploma in Cybersecurity Level 6 programme will provide you with technical skills in cybersecurity that are internationally relevant, and help you create a security mindset. This programme will teach you the fundamental concepts in information systems security, cyber law and regulations, cryptography, network security, security risk assessment, cybersecurity governance and practices, ethical hacking and testing, and incident handling.
VISIT HERE
CYBER SECURITY Cyber security professionals protect the data and systems of digital services we use for daily business and communication. Study at Deakin and gain the skills to understand cyber issues and ways to identify, diagnose and resolve these challenges.
VISIT HERE
Reach out to Aby today to find out how your company can help support the Women in Security Magazine. ABY@SOURCE2CREATE.COM.AU 100
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Our Services Nurture Programs
Event Management
Magazines
Speaker Acquisition
Digital Marketing
Website Creation
Data Admin Services
Lead Generation
Programmatic
Podcasts
No job is too big or too small. Get connected and take control of your business success today!
REACH OUT TODAY
charlie@source2create.com.au
aby@source2create.com.au
TURN IT UP
A PODCAST OF ONE’S OWN With Julia Gillard Former Prime Minister of Australia, Julia Gillard presents a podcast in her role as Chair of the Global Institute for Women’s Leadership. In each episode Julia leads a thoughtful but fun discussion with well-known female (and some male) leaders from the worlds of business, entertainment, media, sport and many more. By celebrating their stories and learning the lessons from their lives, the podcast gives us insight into what needs to be done so more women get to lead!
CLICK TO LISTEN
DIVERSITY DEEP DIVE With Audra Jenkins Welcome to the Diversity Deep Dive Podcast. In this podcast, you will hear insights and uplifting stories of resilience and perseverance against the odds. We will share meaningful dialogue to positively impact diversity and inclusion by dispelling stereotypes, tackling biases, and providing best practices to achieve greater cultural competence.
CLICK TO LISTEN 102
W O M E N I N S E C U R I T Y M A G A Z I N E
HER STORY SPEAKS
SHOES OFF INSIDE
With Jennifer Chesak
With May Lee
When we have the courage to share our stories-walls break down and shame is cast out. Stories have the power to build bridges and break down stereotypes. Relationships, connections, compassion and empathy are built on stories shared and heard. Can stories change the world? Yes—but only if we are brave enough to tell our story and listen to the stories of others. Join me as as real women speak their stories- raw and real, broken and whole, finished and open-ended.
Three trailblazing Asian American women in TV journalism and Hollywood join forces to rattle some cages and dismantle tired old stereotypes about race, age, sex and culture. Award-winning journalist May Lee and actresses Kelly Hu and Tamlyn Tomita (a.k.a. MKT) take on topics that aren't often discussed in the most open, authentic and, sometimes, hilarious way because they are unafraid to be fully themselves
CLICK TO LISTEN
CLICK TO LISTEN
JUST SOMETHING ABOUT HER
INTRO TO AI SECURITY EPISODE 1
With Jennifer Palmieri
With HarrietHacks
Jennifer and Afton Vechery talk about how under-researched women’s health and reproductive systems have been throughout history and how cultural stigmas, ancient legends, perpetuated stereotypes, and institutionalized bans have contributed to big gaps in data and information about women’s health.
Join me in the first of this series of ten Intro to AI Security videos. This one is based on the medium blog of the same name.
CLICK TO LISTEN
Follow me on twitter, Instagram and TikTok @HarrietHacks. Join the slack channel @TheAISecurity.
CLICK TO LISTEN J A N U A RY • F E B R U A RY 2024
THE GUILTY FEMINIST
DIVERSITY CONNECTS US
OUT OF THE SHADOWS
With Deborah Frances-White
With Rachelle Carrié & Dr. Enin Rudel
With Wesley Hamilton
Ever felt like you should be better at feminism? Deborah Frances-White along with her guests, recorded in front of a live audience explores this concept in her comedy podcast. Each week they discuss topics “all 21 first century feminists agree on” while confessing their insecurities, hypocrisies and fears that underlie their lofty principles. I’m a feminist but… one time I went on a women’s rights march, and I popped into a department store to use the loo, and I got distracted trying out face cream. And when I came out the march was gone.
Welcome to Diversity Connects Us. This podcast highlights lived experiences and inspirational stories of strength and tenacity. We will share profound and courageous dialogues that influence diversity, equity, and inclusion by breaking the barriers and labels of stereotypes, confronting biases, and offering best practices to achieve a more significant cultural mindset. We will share some actionable tips from the best trailblazers! Join us as we break through some glass ceilings and disrupt how we think about diversity, equity, and inclusion.
Welcome to "Out of the Shadows." Here, we dive into real and compelling stories that embody tenacity and triumph. Hosted by Wesley Hamilton, we publicly showcase the unsung heroes among us and those breaking barriers. Beyond just stories, this podcast invites you to challenge your preconceptions, rethink stereotypes, and be inspired by authentic journeys.
CLICK TO LISTEN
CLICK TO LISTEN
Be sure to subscribe and join our community; we reshape narratives and bring impactful stories to light together.
CLICK TO LISTEN
BEYOND THE LABEL
BREAKING BOX
BLACKLIGHT
With Dr. Sina McCullough
With Jennifer Lara
With Williesha Morris
Be inspired by individuals from various ages, cultures, backgrounds, and sexualities, who took a leap of faith, broke from tradition, and did something different.-We are not defined by labels or stereotypes. Anything is possible, be you unapologetically.
Breaking the Box is a podcast where we confront and break through the Gender stereotypes society inflicts on us and how it related to To Kill a Mocking bird
Blacklight is dedicated to people of color who defy stereotypes. Brown people don't hike or swim, right? What about dating inter-racially? This podcast will remind you that everyone is unique?
CLICK TO LISTEN I S S U E 18
CLICK TO LISTEN
CLICK TO LISTEN WOMEN IN SECURITY MAGAZINE
103
OFF THE SHELF
MODEL BREAKERS: BREAKING THROUGH STEREOTYPES AND EMBRACING YOUR AUTHENTICITY Author // Charlene Wang Model Breakers: Breaking Through Stereotypes and Embracing Your Authenticity explores the intersection of self-awareness, identity, and minority stories. Charlene Wang invites us to change the limiting beliefs we impose on ourselves and break through the stereotypes that can keep us from achieving our dreams. Through the experiences of numerous Model Breakers, this book will help you to take risks and turn disadvantages into powerful tools.
BUY THE BOOK
I AM NOT: BREAK FREE FROM STEREOTYPES AND BECOME THE WOMAN GOD MADE YOU TO BE Author // Simi John Are you tired of struggling with your identity and settling for a lesser version of you? Are you ready to erase the stories that culture teaches about women and tell a different story? Are you willing to change not just your mindset but the way you live? Then “I AM NOT” is for you.
BUY THE BOOK
UNTAMED Author // Glennon Doyle Filled with hopeful messages . . . encourag[ing] women to reject the status quo and follow their intuition . . . This testament to female empowerment and self-love, with an endearing coming-out story at the center, will delight readers.” Untamed is the first of the empowering books for women because Doyle encourages readers to question what’s beautiful and true for them.
BUY THE BOOK
THE WOMEN CHANGING THE WORLD Author // Peace Mitchell We believe changing the world is 100% possible and it all begins with having the courage to believe that you can. Be inspired by the remarkable true stories of women, just like you who, have followed their calling to make a difference in the world!
BUY THE BOOK
104
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
THE HACKER AND THE STATE: CYBER ATTACKS AND THE NEW NORMAL OF GEOPOLITICS Author // Ben Buchanan “One of the finest books on information security published so far in this century―easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” ―Thomas Rid, author of Active Measures “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age. Buchanan… captures the dynamics of all of this truly brilliantly.”
BUY THE BOOK
NAVIGATING THE CYBERSECURITY CAREER PATH Author // Helen Patton Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams. In this book, listeners will find: explanations of why and how the cybersecurity industry is unique and how to use this knowledge to succeed; discussions of how to progress from an entry-level position in the industry to a position leading security teams and programs.
BUY THE BOOK
SECURING OUR FUTURE: EMBRACING THE RESILIENCE AND BRILLIANCE OF BLACK WOMEN IN CYBER Author // The Black Women in Cyber Collective Diversity is not just a buzzword; it’s a critical ingredient in the recipe for a secure digital future. Research consistently underscores the importance of diverse teams in fostering innovative solutions. The cybersecurity realm, where threats constantly evolve, particularly benefits from diverse perspectives that can anticipate and counteract multifaceted challenges.
BUY THE BOOK
GOOD NIGHT STORIES FOR REBEL GIRLS: 100 TALES OF EXTRAORDINARY WOMEN Author // Elena Favilli Good Night Stories for Rebel Girls introduces us to one hundred remarkable women and their extraordinary lives, from Ada Lovelace to Malala, Elizabeth I to Serena Williams. Empowering, moving and inspirational, these are true fairy tales for heroines who definitely don't need rescuing.
BUY THE BOOK
I S S U E 18
WOMEN IN SECURITY MAGAZINE
105
OFF THE SHELF
THAT'S WHAT SHE SAID: WISE WORDS FROM INFLUENTIAL WOMEN Author // Kimothy Joy “A stunning book that celebrates a diverse group of inspirational women, from Maya Angelou to Malala Yousafzai. The book features illustrations and quotes with illuminating biographies to inspire women of all ages and backgrounds.” – Hello Sunshine.
BUY THE BOOK
WOMEN ARE WARRIORS (IN SPANISH) Authors // Irene Cívico and Sergio Parra Castillo The first of our books about women has an amazing title. It tells 26 different stories of 26 women who, throughout history, changed the way people see the world in their respective fields. A journey through history, from old figures such as Coco Chanel and Audrey Hepburn, to the most current, such as singer Lady Gaga.
BUY THE BOOK
HER FEARLESS RUN: KATHRINE SWITZER’S HISTORIC BOSTON MARATHON Author // Kim Chaffee Kathrine Switzer changed the world of running. This narrative biography follows Kathrine from running laps as a girl in her backyard to becoming the first woman to run the Boston Marathon with official race numbers in 1967. Her inspirational true story is for anyone willing to challenge the rules.
BUY THE BOOK
I REALLY NEEDED THIS TODAY: WORDS TO LIVE BY Author // Hoda Kotb In I Really Needed This Today, Hoda not only shares 365 sayings and quotes, she writes about the people and experiences that have pushed her to challenge boundaries, embrace change, and explore relationships to their fullest. Written with her signature wit and warmth, this book is the ideal companion to tuck beside your bed or to bring with you on-the-go to keep you motivated, recharged, and inspired each day.
BUY THE BOOK
ANNAPURNA: A WOMAN'S PLACE Author // Arlene Blum It illustrates how one woman’s courage to forge ahead in a male-dominated world produced scientific work that challenged gender stereotypes and led to all-male clubs breaking their male-only rules.
BUY THE BOOK
106
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
NEW ZEALAND WOMEN IN SECURITY AWARDS 2023 #2023WISAWARDS IN PARTNERSHIP WITH
CyberCX
UNVEILING BRILLIANCE: HIGHLIGHTS FROM THE 2023 NEW ZEALAND WOMEN IN SECURITY AWARDS by Abigail Swabey
In the course of a night filled with glamour,
for an evening even more inspirational than its
inspiration and celebration the 2023 New Zealand
predecessor. Source2Create, the organiser of both
Women in Security Awards unfolded spectacularly
events, achieved something truly extraordinary,
leaving an indelible mark on attendees. Hosted
bringing together students, professionals and
by the dynamic Alexia Hilbertidou, founder of Girl
industry experts, and shining a spotlight on security
Boss, and meticulously created and produced by
heroes who redefine norms, reshape workplaces and
Source2Create, the evening brought together 300
champion careers in security. The awards ceremony
industry leaders, professionals and students at
has become a platform to honour their exceptional
Auckland’s Aotea Centre on November 9th.
achievements, making the evening truly electrifying.
Violinist Hannah Fang opened the event
ESTEEMED JUDGES
spectacularly with a performance that captivated the
The panel of esteemed judges evaluated over 250
audience and set the tone for an evening of elegance
nominations across 15 categories, ensuring the
and distinction. Te Aroha Grace graced the event with
integrity of the awards ceremony. Their commitment
a mesmerising welcoming ceremony, creating an
to fairness and excellence elevated the event, adding
atmosphere of unity and respect. Abigail Swabey’s
to its prestige.
opening speech introduced the theme for 2023, Unmasking the Future of the Security Industry, setting
The generous support of sponsors CyberCX, Spark
the stage for an extraordinary night.
NZ, Westpac, Delinea, SSS IT Security Specialists, Workday and Outfox enabled Source2Create to
The 2023 New Zealand Women in Security
realise its vision for the event: that it would make
Awards followed the inaugural event last year. The
a significant contribution towards building a more
Warmth, camaraderie and a shared commitment
inclusive and progressive security industry.
to diversity in the workplace provided a foundation
108
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
The event’s theme encapsulated the spirit of breaking
involvement and support of each attendee. The
barriers and embracing innovation. Attendees
evening was a tribute to brilliance, dedication and the
were invited to venture beyond the conventional,
relentless pursuit of progress in the security industry.
welcome diverse perspectives and join the ascent to
As the night unfolded, the future of the security
new horizons.
industry was revealed: inclusivity, innovation and celebration of diversity.
The act of unmasking was presented as a rebellion, liberating individuals from the constraints of
Awards given out on the evening were:
conformity. It embraced diversity, challenging and innovation to flourish. Unmasking became
CATEGORIES AND FINALISTS THE ONE TO WATCH IN IT SECURITY
a powerful act, shattering conventional moulds
WINNER: Chido Liberta Mushaya, Te Whatu Ora
and opening doors for the industry to reach
HIGHLY COMMENDED: Issy Riddell-Garner, Deloitte
unprecedented heights.
HIGHLY COMMENDED: Jaimee Mullins, SSS IT
the status quo and allowing creative thinking
Security Specialists The awards ceremony recognised winners, highly commended honourees and recipients of special
HARAKEKE ACHIEVEMENT AWARD
recognition awards. The accolades celebrated
WINNER: KPMG, Kiwa mentoring programme
the outstanding contributions made by inspiring individuals, innovative initiatives and remarkable
CYBERSECURITY CHAMPION
organisations in the community.
WINNER: Denise Carter-Bennett, Datacom New Zealand
The 2023 New Zealand Women in Security Awards
HIGHLY COMMENDED: Katja Feldtmann, Cybershore
event was a resounding success thanks to the
SPECIAL RECOGNITION: Robyn Frye, Workday
I S S U E 18
WOMEN IN SECURITY MAGAZINE
109
CHAMPION OF CHANGE
BEST SECURE CODER
WINNER: Dean Navarro, Fidelity Life Assurance
WINNER: Darya Koko, Best Practice Software
Company Limited
BEST PLACE TO WORK IN SECURITY
BEST INNOVATIVE BUSINESS “RESHAPING THE FUTURE” OF THE SECURITY INDUSTRY
WINNER: Spark NZ
WINNER: Xero
MOST INNOVATIVE EDUCATOR IN CYBERSECURITY
BEST INDUSTRY INITIATIVE THAT SUPPORTS DIVERSITY, INCLUSION AND EQUALITY
WINNER: Education Arcade
WINNER: OMGTech
HIGHLY COMMENDED: Xero - Security Champions
HIGHLY COMMENDED: ISACA Auckland Chapter and
Program
SheLeadsTech
UNSUNG HERO WINNER: Mahsa McCauley, She Sharp
NEW ZEALAND’S MOST OUTSTANDING IN IT SECURITY
HIGHLY COMMENDED: Olivia Uhrle, Quantum
WINNER: Dila Beisembayeva, Te Pūkenga
Security Services
HIGHLY COMMENDED: Jenna Whitman, Callaghan Innovation
BEST SECURITY STUDENT WINNER: Courtney Monique Wilson, The University of Waikato
BEST PROGRAM FOR YOUNG INDIVIDUALS IN SECURITY WINNER: Cyber Skills Aotearoa
BEST SECURITY MENTOR
110
WINNER: Michelle Crowe, Xero
BEST VOLUNTEER
HIGHLY COMMENDED: Hilary Walton, Microsoft
WINNER: Abby Zhang, Kordia
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Best Secure Coder WINNER
Darya Koko Software Security Engineer Best Practice Software
Darya's commitment to developing a secure application, implementing encryption mechanisms, and conducting rigorous testing highlights her dedication to safeguarding sensitive information and ensuring secure transactions. Her significant contribution to the medical software field, with a focus on patient data security, exemplifies her unwavering commitment to privacy and data protection. Additionally, Darya's active involvement in the cybersecurity community, including publications and participation in threat modeling hackathons, showcases her dedication to knowledge sharing and promoting diversity in the field. These achievements are truly remarkable.
FINALISTS
NOMINEES
Annie Vella
Annie Vella
Distinguished Engineer Westpac
Brooke Rakowitz
Brooke Rakowitz Engineer Xero
Jhalak Modi Beena Arora Darya Koko
Darya Koko Software Security Engineer Best Practice Software
112
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
DARYA KOKO, WINNER OF THE 2023 NZ WOMEN IN SECURITY AWARD: ARCHITECTING SECURITY EXCELLENCE
Darya Koko stands as a beacon of innovation in cybersecurity after earning the prestigious 2023 New Zealand Women in Security Award for Best Secure Coder. Her exceptional contributions span diverse projects, showcasing her prowess as a software developer and her unwavering commitment to fortifying digital landscapes. As a software engineer at Best Practice Software Darya played a pivotal role in Kiwibank’s 3DSecure project, establishing an additional security layer for online credit and debit card transactions. Darya ensured the project’s success and timely deployment. Her tasks encompassed software development, code writing and the seamless release to production. The project aimed to bolster the security of online payments by using encryption and decryption mechanisms for secure data transmission.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
113
SECURITY FOR MEDICAL SOFTWARE In her role at Best Practice Software Darya also prioritised the integration of robust security measures into medical software. Recognising the sensitivity of patient information, she implemented role-based access controls, permission management and regular security updates. By adhering to industry best practices, Darya contributed to the creation of a secure environment for users, ensuring the confidentiality, integrity and availability of medical application data. As a participant in a threat modelling hackathon Darya engaged in hands-on exercises to identify vulnerabilities and design robust security controls. This experience sharpened her technical skills and emphasised the importance of proactive threat modelling in building secure systems. Her multifaceted contributions to Kiwibank’s cards
Navigating industry-specific regulations and
and payments projects underscore her proficiency
compliance requirements along with the integration
in cryptography, encryption, decryption, PCI and
of diverse systems presented challenges that Darya
scheme compliance, security key handling and
overcame with her meticulous approach. These
DevSecOps. Her role involved the development of
projects laid a robust foundation for organisations to
a security payment gateway, a secure pin-to-pin
build upon. Secure coding practices not only fortify
feature and a secure block/unblock facility for credit
defences against external threats but also mitigate
and debit cards. These initiatives fortified secure
the financial and reputational risks associated with
payments and empowered users to set and store pin
security breaches.
codes, make secure transactions and block/unblock cards as needed.
Darya Koko’s journey exemplifies excellence in secure coding, and her recognition as the Best
Beyond her coding expertise, Darya made a
Secure Coder at the 2023 NZ Women in Security
significant impact on the industry by publishing
Awards is a testament to her enduring commitment
an article in Women in Security on the History of
to cybersecurity innovation.
Women in Tech and Cyber Security (April/May 2021). This contribution aimed to empower women and shed light on the history of women in technology
www.linkedin.com/in/daryakoko
and cybersecurity.
114
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Best Volunteer WINNER
Abby Zhang Security Analyst, Kordia
Abby is regarded as an invaluable asset to the security industry due to her exceptional technical skills, mentorship, dedication to diversity and inclusion, and unwavering commitment to positive change. Her influence extends widely, playing a pivotal role in promoting diversity and inclusion, effectively addressing concerns, and inspiring others in the field. Abby's contributions have not only propelled cybersecurity forward but have also cultivated a positive and inclusive culture within the industry.
FINALISTS
NOMINEES
Abby Zhang
Celene Aitchison
Security Analyst Kordia
Toni James
Toni James
Ayla Narciso
Security Engineer Salesforce
Jan Thornborough
Nicole Yue Lin
Nicole Yue Lin
Customer Success Manager Crayon
Abby Zhang Denise Carter-Bennett
Celene Aitchison Security Certification and Accreditation Specialist Spark NZ
I S S U E 18
WOMEN IN SECURITY MAGAZINE
115
EMPOWERING CHANGE: ABBY ZHANG'S IMPACT ON CYBERSECURITY AND VOLUNTEERISM In a remarkable achievement, Abby stands tall as the winner of the Best Volunteer award at the 2023 New Zealand Women in Security Awards for the second year in a row. Abby’s journey is a testament to her multifaceted contributions, her seamless blending of technical prowess and mentorship and her fervent commitment to diversity and inclusion in the IT security industry.
VOLUNTEER ROLES Abby’s volunteer journey is extensive and impactful, reflecting her dedication to uplifting others in the industry. She currently holds crucial positions in ISACA’s Auckland Chapter, including membership, sponsorship and marketing committee co-chair, board member and marketing director. Her past roles
CAREER
include: being the SheLeadsTech liaison in ISACA’s
Abby’s professional journey in the IT security industry
Auckland Chapter, a SheLeadsTech ambassador
is equally impressive. As a security analyst at Kordia
in ISACA; a chapter lead and trustee for the New
and a former information security consultant at Triple
Zealand Network for Women in Security; a judge for
Ledger Limited she brings a wealth of experience and
the Global OSINT Search Party CTF for Trace Labs in
knowledge to the table.
2020, 2021 and 2022; ISACA Auckland CommunITy
116
day team lead support for ISACA Auckland chapter;
Abby has overcome her own challenges to break into
and a patroller for Community Patrols of New
security roles. As a female transitioning from a career
Zealand (CPNZ) from December 2020 to February
in a different industry, with English as her second
2023. Beyond the realm of cybersecurity, Abby
language, Abby bucks the trend of who most people
extends her volunteering to NZ Parkrun and serves
assume a stereotypical security analyst should
as a volunteer translator for ISACA China.
be. It’s for this reason she’s particularly passionate
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
The impact of Abby’s volunteer work is exemplified by her proactive engagement with stakeholders where she actively listens to feedback and takes concrete actions. Her personal narrative, shared courageously as a non-native English speaker in tech, inspires others to overcome challenges. Abby’s recent accolades, which include the Best Volunteer Award two years in a row in the New Zealand Women In Security Awards, attest to the profound impact she has had in her various roles.
INSPIRATION FOR CYBERSECURITY ADVANCEMENT about seeing more diversity and inclusion in the field.
Abby’s inspiration to advance cybersecurity and
She sees firsthand the value women and minorities
safety in New Zealand emerges from her belief in
can make and wants to inspire others like her to
the power of role models and positive influences.
follow their dreams and embark on an information
In her day to day role she mentors and coaches
security career.
fellow security analysts from diverse backgrounds, creating a safe space for learning and growth.
COMMITMENT TO VOLUNTEER ACTIVITIES
Abby advocates for diversity and inclusion through
Abby’s commitment to her volunteer activities is
conferences, writing and event organisation,
nothing short of inspirational. She goes above and
contributing significantly to shaping the industry’s
beyond, setting an example for women in the industry
mindset.
through the events she organises on behalf of ISACA and SheLeadsTech. Despite the time and expertise
OUTSTANDING CONTRIBUTIONS
required, Abby spearheads initiatives that create a
Abby is an outstanding example of the change
supportive environment for women. Her dedication
one person can make. Her holistic and substantial
is evident in the numerous events she orchestrates,
contributions to cybersecurity through her technical
including joint study sessions, workshops, panels
expertise, mentorship initiatives, advocacy for
and scholarship programs; all aimed at fostering
diversity and inclusion and her unwavering
diversity and inclusion.
commitment make her an invaluable asset. Abby’s impact is visible in the policies she has influenced,
GOING ABOVE AND BEYOND TO RAISE AWARENESS
the individuals she has mentored, the events she has organised and the stories she has shared.
Abby’s efforts to raise awareness extend far beyond her immediate professional circles. Her influence
Abby’s journey is a beacon of inspiration in
reverberates through public speaking engagements,
the cybersecurity landscape. Her multifaceted
writings and organised events. Her participation
contributions, resilience and commitment to
in conferences and panel discussions such as
fostering an inclusive and diverse environment
ISACA Auckland SheLeadsTech with New Zealand
make her a driving force for positive change in the IT
Network for Women in Security’s (NZNWS) The Rise
security industry.
of Tech Women fuels meaningful conversations around strategies for a more diverse and inclusive workspace.
I S S U E 18
www.linkedin.com/in/abbytryharder
WOMEN IN SECURITY MAGAZINE
117
Champion of Change WINNER
Dean Navarro With 18 years of experience, you've demonstrated leadership, diversity promotion, and mentorship. Your commitment to gender equality is evident in initiatives like the Information Security Ambassador program. Your advocacy for cybersecurity awareness, especially among women, and support for career growth have led to tangible improvements in risk management and a stronger security culture. Your contributions are commendable.
HIGHLY COMMENDED
Ben Amadi With a diverse background spanning various industries, you've made significant contributions. Your efforts extend beyond the workplace, actively supporting underrepresented groups, especially women and minorities. You play a pivotal role in fostering diversity in technical security education, encouraging female engineers to participate in Secure Coding Initiatives. Your dedication to providing dedicated time for training and mentorship has driven increased female engagement, with impressive results. Your contributions are truly commendable.
FINALISTS
Ben Amadi Xero
Conan Bradley Kordia
Dean Navarro Fidelity Life Assurance Company
N-yook Looong Q Spark NZ
118
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
DEAN NAVARRO: A CATALYST FOR CHANGE IN NEW ZEALAND'S CYBERSECURITY LANDSCAPE Dean Navarro, head of information security at Fidelity Life, was honoured with the Champion of Change award at the 2023 New Zealand Women in Security awards. His 18-year career in the cybersecurity industry spans multiple countries including the Philippines, Qatar and New Zealand and is characterised by his commitment to fostering diversity, equity and inclusion. Dean’s professional journey, from security engineer to head of information security, exemplifies his dedication to excellence. His role at two of New Zealand’s leading life insurers, AIA NZ and Fidelity Life, has been marked by a transformative leadership approach. At Fidelity Life he took on the significant challenge of improving the company’s risk maturity and driving action around information security. He is a visionary leader who prioritises building a dynamic and diverse team, emphasising mentorship and career progression opportunities. His commitment to Fidelity Life’s diversity, equity, inclusion and belonging (DEIB) strategy ensures equal opportunities for all team members.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
119
Dean’s initiatives have resulted in significant benefits for women in cybersecurity. Increased representation, recognition, mentorship programs and support networks tailored to women have become integral components of his strategy. Women have experienced a cultural shift towards inclusivity where they feel valued, respected, supported and empowered. Dean’s motivation to become a champion of change is rooted in his core values of community contribution and paying it forward. His mentorship is not only a selfless act but a two-way relationship that enhances his leadership skills and provides new perspectives. He finds gratification in seeing others succeed and in making mentorship a fulfilling and enriching experience. One direct beneficiary of Dean’s inclusive approach
In conclusion, Dean’s journey from security
says: “Dean has supported my growth by sponsoring
engineer to champion of change is a testament to
initiatives to propel my career.” One such initiative,
his unwavering commitment to diversity, equity
the Information Security Ambassador program,
and inclusion in cybersecurity. His transformative
focuses on gender equality, breaking down barriers
initiatives have not only impacted Fidelity Life but
and fostering a stronger security culture across
have had a ripple effect across the industry, setting
the organisation.
a standard for inclusive leadership and cultural transformation. Dean’s contributions deserve
ORCHESTRATING A CULTURAL SHIFT
recognition and appreciation, making him a true
In a little more than a year, Dean has orchestrated
inspiration for positive change in cybersecurity.
a cultural shift at Fidelity Life, resulting in tangible improvements. Marcus McClosky, Fidelity Life’s general legal counsel, says: “Under Dean’s leadership
www.linkedin.com/in/engrdeannavarrojr
we have seen material uplift in security capability and sophistication.” Some of Dean’s key achievements include challenging norms in technology risk profiles, developing a comprehensive information security strategy and assembling a diverse team committed to gender and ethnic diversity. Dean’s journey has not been without challenges. From facing discrimination based on his origin to addressing bias and resistance to change, he has consistently demonstrated resilience and innovative problem-solving. Dean actively challenges deeprooted gender-based discrimination and bias within the industry, promoting inclusive hiring practices and advocating for inclusive decision-making processes.
120
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
NEW ZEALAND WOMEN IN SECURITY AWARDS 2024
CALL FOR EXPRESSION OF INTEREST
BECOME A SPONSOR TODAY EVENT DATE: THURSDAY | 7 NOVEMBER 2024
If you're part of an organisation dedicated to promoting diversity and inclusion, we'd love to discuss our 2024 Awards packages with you. These packages are designed to further our shared mission of recruiting, retaining, and advancing women in the cybersecurity workforce.
CONTACT Aby@source2create.com.au or Charlie@source2create.com.au
By becoming a sponsor and supporting our event, you'll visibly demonstrate your commitment to celebrating diversity and recognising accomplishments within the security industry.
The One to Watch in IT Security WINNER
Your career in IT security is more than a profession; it's your driving force for lasting impact. You've surmounted challenges, mentored future professionals, led thought leadership, and pushed boundaries in safeguarding digital realms.
Chido Liberta Mushaya Fujitsu
We celebrate you for your remarkable achievements and dedication to an inclusive, innovative, and secure cybersecurity field. You're undeniably "The One to Watch in IT Security," and we eagerly await your future contributions.
HIGHLY COMMENDED
Jaimee Mullins SSS IT Security Specialists
122
W O M E N I N S E C U R I T Y M A G A Z I N E
Your journey in cybersecurity, starting as an intern and rising to a pivotal role at SSS, reflects your unwavering dedication and adaptability. Leading significant projects, optimizing processes, and advocating for cybersecurity, particularly among women, demonstrate your commitment to innovation and progress. Your passion for cybersecurity, driven by the chance to safeguard data and effect change, is truly inspiring. Your impressive career growth and steadfast industry commitment deserve commendation.
J A N U A RY • F E B R U A RY 2024
HIGHLY COMMENDED
Issy Riddell-Garner Deloitte
Your cybersecurity journey promotes inclusivity and values diversity, especially for young women and gender minorities. You excel in incident response and SOC processes, earning client trust. Your initiatives break down industry barriers, transform perceptions of security teams, and inspire diversity. Your work with high-school girls and contributions to Kiwibots NZ and Deloitte's Women+ in Cyber initiative highlight your dedication to the industry's growth and creating a cooperative, supportive culture. Your achievements are truly commendable.
FINALISTS
NOMINEES
Chido Mushaya
Lauren Nobbs
Elaine Sabado
Kirsten Neustroski
Fujitsu
Aimee Tomlinson
Eleanor Wright
Lavanya Sajwan
Issy Riddell-Garner
Aleisha Hoult
Elena Calderon
Liz Rooney
Deloitte
Amelia Sarumaha
Freisi Alfonseca
Mala Rehan
Jaimee Mullins SSS IT Security Specialists
Ana Ramirez
Gwen Morgan
Meera Lekshmy
Ashleigh Deverell
Iris Sastrillo
Megha Koli
Myla San Miguel Flux Federation
Ashleigh Forbes‑Day
Isabella Riddell‑Garner
Monique McKenna
Diana Musatova
Beena Jose
Jacinta Fue
Myla San Miguel
One New Zealand
Cat Salanguit
Nicole Gaskell
Gwen Morgan
Chido Mushaya
Jaimee del Rio‑Pasig
Inphysec
Christie Anne Ercilla
Jenna Whitman
Daphne Gumban
Kate Bradford
Diana Musatova
Katja Feldtmann
Dimpal Tailor
Keerthana Kumar
Divya Dantuluri
Kim Sharma
Liz Rooney One New Zealand
Eleanor Wright Quantum Security Services Ltd
I S S U E 18
Jaimee Mullins
Nisha Vasudev Olivia Yang Pratiksha Dalwadi Sasha Mullins Shraddha Nayak Vivien Hii
WOMEN IN SECURITY MAGAZINE
123
CHIDO LIBERTA MUSHAYA: A VISIONARY FORCE IN CYBERSECURITY, AWARDED THE ONE TO WATCH IN IT SECURITY Chido Liberta Mushaya, the recipient of the prestigious One to Watch in IT Security Award at the 2023 New Zealand Women in Security Awards, is making waves in the technology and cybersecurity arena. With a career spanning 13 years, Chido has garnered recognition for her significant contributions and for displaying unrealised potential, setting her apart as a standout individual in the industry. Throughout her distinguished career, Chido has left an indelible mark on organisations worldwide, enhancing their cybersecurity posture. Notable among her accomplishments is the design and development of a ground-breaking cybersecurity roadmap for a critical national infrastructure organisation. This initiative, lauded by top stakeholders, reflects her ability to align security priorities across diverse environments while navigating budget constraints. Crafting tailored cybersecurity plans for organisations of varying sizes has become a hallmark of Chido’s expertise. Chido’s influence extends beyond the organisational realm. As a recognised cybersecurity strategy
124
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
thought leader she delivered a compelling talk on
AMBITIOUS PLANS
“How to Make an Effective Cybersecurity Strategic
Looking ahead, Chido has ambitious plans to support
Plan” at the 2022 ISACA Annual Day in Wellington.
her commitment to the security industry. Integral to
Her role as a cybersecurity architect for government
her vision is her search for additional education from
agencies, where she spearheaded innovative security
top-tier programs, active participation in mentorship,
solutions, further solidifies her reputation as a
and contributing to career advice platforms.
cybersecurity expert. What Chido loves most about the security industry is
ADVISOR TO HIGH LEVEL EXECUTIVES
its emphasis on meritocracy, its global opportunities
Her proficiency in designing cybersecurity policies
and the opportunities it presents for collaboration
based on international standards positions her
with brilliant minds. Her journey from Harare to
as an invaluable advisor to high-level executives.
principal cybersecurity consultant for a global
Chido’s expertise in leading incident response
organisation exemplifies the industry’s openness to
efforts underscores her ability to handle complex
diverse talent.
cybersecurity challenges under pressure. Chido’s journey stands as a testament to her Beyond technical excellence, Chido is committed to
unwavering commitment to continuous growth,
mentoring and coaching, nurturing talent within the
innovation and to making a positive impact on the
industry. This dedication reinforces her passion for
security industry. Chido’s trajectory holds the promise
making a lasting impact.
of shaping the future of cybersecurity through visionary leadership and steadfast dedication. Her
Chido’s journey has not been without challenges.
source of inspiration runs deep, stemming from
As an expatriate of African origin she navigated
her mother’s unyielding strength. In the face of
cultural adaptation challenges when moving to a new
widowhood and the responsibility of raising seven
country. Balancing parenthood and career presented
children, Chido’s mother worked tirelessly to secure
another significant hurdle. Chido’s resilience,
each child a university education. This indomitable
proactive approach and the support of her inclusive
spirit serves as an enduring wellspring of motivation
work environment have enabled her to overcome
for Chido, influencing her path and fostering a deep
occasional bias and stereotyping challenges.
appreciation for hard work and perseverance.
Chido’s impact transcends her immediate work
Chido is a freelance Cybersecurity Strategist and
environment. Her commitment to mentoring young
Security Architect, living in New Zealand. She has
professionals and guiding them toward international
led multiple cross functional teams to deliver
opportunities underscores her dedication to
technology risk management capabilities for various
promoting diversity. As founder of the LinkedIn
organisations. When she is not at work, she is learning
community Zimbabwean of Women she provides
Wiggles music and choreography to entertain her
career guidance and personal development tips to
daughter and nieces.
its members. In showcasing excellence and innovation, Chido
www.linkedin.com/in/chido-mushaya-92a65915
plans strategically and leverages emerging technologies, sharing her knowledge with the cybersecurity community. Her initiatives include greenfield security projects and contributions to industry publications, conferences and webinars.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
125
YOU E R A
INTEREST
E D?
Global Contributors
WANTED OUR NEXT ISSUE'S THEME: Issue 19: Who should be in security?
WAYS YOU CAN CONTRIBUTE: Contribute to one of our
editorial sections
What's Her Journey Career Perspectives Industry Perspectives Technology Perspectives Student in Security Spotlight
Run a listing for
any of the following
Submission Have a book? Deadline: Have a podcast? Jan 24th Have a blog? Have free training and learning opportunities available?
REACH OUT TO JANE@SOURCE2CREATE.COM.AU TODAY
www.womeninsecuritymagazine.com
Best Security Student WINNER
Courtney Wilson University of Waikato
FINALISTS
NOMINEES
Courtney Wilson
Abigail Jaskari
Kaitlin Jones
The University of Waikato
Ayla Narciso
Kate Han
DEFEND
Courtney Monique Wilson
Kimberly Pioquinto
Jessica Lowe
Danielle Domingo
Olivia Uhrle
Gunjan Bhaskar
Pauline Pura
Ilaisaane Falevai
Rafana Fatima
Jessica Lowe
Sarah Pharaoh
Jingjing Zhang
Stacey Dawson
Ayla Narciso
University of Auckland
Gunjan Bhaskar Spark NZ
I S S U E 18
Courtney's unwavering commitment to her community is exemplified through active participation in youth councils, committees, and her exceptional leadership as a high school prefect. Her passion for the dynamic security industry and relentless dedication to safeguarding personal information and online security distinguish her as a truly deserving recipient. Courtney's remarkable contributions extend far beyond the cybersecurity realm, making a profound impact on her community and the world at large.
WOMEN IN SECURITY MAGAZINE
127
COURTNEY WILSON: FORGING EXCELLENCE IN CYBERSECURITY‑ BEST SECURITY STUDENT IN THE 2023 NZ WOMEN IN SECURITY AWARDS Courtney Wilson has emerged as a trailblazer, securing the coveted title of Best Security Student at the esteemed 2023 New Zealand Women in Security Awards. Courtney is studying for a Master of Cyber Security degree at the University of Waikato, and works as an Information Security Analyst at Gallagher and her journey is a testament to her tenacity and leadership in a field traditionally dominated by men. Her journey exemplifies a commitment to academic excellence, ground-breaking research and triumph in the face of unexpected challenges, showcasing Courtney as a trailblazer in cybersecurity. Courtney’s achievements are exceptional. She was the first woman awarded a Sir William Gallagher Cyber Security Scholarship to support study for her
128
master’s degree and has leveraged this prestigious
She has successfully completed a Bachelor of
scholarship to pursue ground-breaking research
Computing and Mathematical Sciences with first
and produce a dissertation under the banner of
class honours, specialising in computer science and
Gallagher Security.
data analytics.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
technology security analyst, gaining invaluable insights into the intricacies of the security sector. Today, Courtney serves as president of the Waikato Women in STEM club, actively engaging with industry professionals to foster club development and inspire more young women to pursue STEM careers. Her commitment extends to running a mentorship program through the club, connecting members with industry professionals for valuable mentoring experiences. Courtney has held multiple leadership roles. She has Beyond the academic realm, Courtney shone as a
been secretary and chairperson of the Whakatane
standout member of a group of computer science
District Youth Council, a youth representative on the
students from Waikato University that earned a spot
Eastern Bay of Plenty Brass Band committee and
to compete in the Imperial College International
was a prefect at her high school.
capture the flag contest in 2022, securing a position among the top 15 university teams worldwide.
Courtney finds the security industry’s continuous
The team was the sole representative from
evolution a captivating challenge which she
Oceania and finished in the top ten, despite a team
embraces wholeheartedly. The industry’s dynamic
member contracting COVID and having to leave the
nature keeps her engaged and on her toes, which she
competition early. Courtney and her fellow female
relishes. She is passionate about making a difference
teammate demonstrated remarkable resilience and
by contributing to a secure online landscape and
excellence on the global cybersecurity stage.
safeguarding users’ personal information. Courtney’s commitment to effecting positive change in
FOUNDER OF WAIKATO WOMEN IN STEM CLUB
cybersecurity reflects her dedication to enhancing
In addition to her academic achievements, Courtney
evolving technology landscape.
digital security and protecting users in an ever-
has successfully navigated the challenges of being a woman in a predominantly male field. She took proactive steps to address the gender gap by
www.linkedin.com/in/-courtneywilson
founding the Waikato Women in STEM club at the University of Waikato. The club, although facing challenges of limited funding and being for women only, has thrived under Courtney’s leadership, providing support and encouragement to women in STEM through professional development workshops, mentorship opportunities and engaging social events. Courtney’s leadership potential is further exemplified by her hands-on experience in the industry. During her master’s she undertook an internship in artificial intelligence at TOMRA Fresh Food and then transitioned into an employee role as an information
I S S U E 18
WOMEN IN SECURITY MAGAZINE
129
Best Program for Young Individuals in I T Security WINNER
Cyber Skills Aotearoa by Grok Academy
This program is a game changer for New Zealand, positively impacting women, educators (kaiako), and students (akonga) across Aotearoa. It promotes digital resilience, critical thinking, and ethical behavior while challenging cybersecurity career stereotypes. It showcases opportunities for women and creates real-world connections through simulations, driving positive change in the cybersecurity field. Your efforts are truely commendable.
FINALISTS
NOMINEES
Cyber Skills Aotearoa
Surf Smart program NZ
Grok Academy
Education Arcade
Education Arcade Brock Roderick
Youth Action Squad NetSafe
Cyber Skills Aotearoa Youth Action Squad Women+ in Cyber
Women+ in Cyber Deloitte
130
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
EMPOWERING TOMORROW: GROK ACADEMY'S CYBER SKILLS AOTEAROA TRIUMPHS AT THE 2023 NEW ZEALAND WOMEN IN SECURITY AWARDS At the 2023 New Zealand Women in Security Awards, Grok Academy’s Cyber Skills Aotearoa online program secured the prestigious Best Program for Young Individuals in IT Security Award. This accolade is a testament to the program’s innovative approach and significant contributions to cybersecurity education, especially in fostering women’s empowerment in the field. Launched in October 2022, Cyber Skills Aotearoa aims to provide teachers and Year 6-13 students with classroom-ready activities and challenges to develop students’ cybersecurity skills and equip students with essential skills for navigating the online world securely. Cyber Skills Aotearoa is a collaborative effort with Tātai Aho Rau Core Education with sponsorship and support from ASB, AWS, BNZ and government bodies including the Ministry of
I S S U E 18
WOMEN IN SECURITY MAGAZINE
131
Education, New Zealand’s Computer Emergency
The positive impact of Cyber Skills Aotearoa is
Response Team (Cert NZ) and Network for Learning
evident in the feedback received from kaiako
(N4L). All learning resources are available in English
(teachers) and ākonga (students). Trudy Keys from
and te reo Māori.
St Margaret’s School says, “Our students have been reluctant to engage in the digital curriculum and this
Through online content and face-to-face interactions
has been a program that has captured their interest.”
students gain insights into the breadth of opportunities in cybersecurity. Exposure to videos
The program’s engagement with specific
of industry professionals helps in demystifying the
initiatives targeting all-girls schools and schools in
industry, breaking stereotypes and showcasing the
underrepresented communities further emphasises
varied career pathways available.
its commitment to making a positive difference in the lives of women in New Zealand.
COLLABORATION WITH INDUSTRY AND GOVERNMENT
Grok Academy’s Cyber Skills Aotearoa has not only
In the ever-changing landscape of cybersecurity,
scored the Best Program for Young Individuals in IT
Cyber Skills Aotearoa stays current through close
Security Award at the 2023 New Zealand Women in
collaboration with industry and government. Subject
Security Awards, it has also carved a transformative
matter experts contribute to course content, ensuring
path for women in the field. It stands as a beacon of
relevance and authenticity. And the program’s
educational innovation, diversity and empowerment,
continuous evaluation, revision and feedback from
showcasing the impact that thoughtful cybersecurity
teachers contribute to its evolution and alignment
education can have on the future of technology and
with industry standards.
the individuals shaping it.
With a mission to cultivate a cyber-aware generation,
Grok Academy is your one-stop-shop for all things
the program focuses on fostering digital resilience,
Digital Technologies. We are an Australian-based
critical thinking and ethical behaviour in intermediate
not-for-profit organisation made up of education,
and high school students. Beyond its educational
curriculum, and coding experts. Our online learning
content, Cyber Skills Aotearoa distinguishes itself
platform contains educational activities that align
through its unwavering commitment to diversity
with the NZ digital technologies curriculum. Our
and inclusion, seeking to eliminate barriers and
cyber security specific resources are available in
create equal opportunities for women in the
both English and Te Reo Māori and are free to all NZ
cybersecurity profession.
school children.
In the 12 months since its inception, Cyber Skills Aotearoa has left a significant imprint, engaging 11,176 students, including 4560 female students, across 317 schools and kura kaupapa Māori (Māori-
www.facebook.com/grokacademy
twitter.com/grokacademy
language schools) in New Zealand.
www.instagram.com/grokacademy
REAL WORLD RELEVANCE
www.linkedin.com/company/grokacademy
A key strength of the program lies in its realworld relevance. Students engage with simulated environments, allowing them to experiment in a
www.tiktok.com/@grok_academy
targeted, sandboxed manner. The content of each module is linked to events impacting students’ daily lives, creating meaningful connections between the program and the real world.
132
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Most Innovative Educator WINNER
Education Arcade A remarkable passion project committed to simplifying and enlivening cyber security education. Despite being run by a single individual with a full-time job, Education Arcade continuously elevates its offerings. It's global impact is evident, with content adopted by schools and districts worldwide. Recognised as a beacon of best practices and referenced in academic studies, including social engineering training programs, Education Arcade is making a substantial impact in the field of security education. Congratulations on this remarkable achievement!
HIGHLY COMMENDED
Security Champions Program team from Xero Xero's commitment to cybersecurity shines as you expand globally. Your groundbreaking Security Champions program cultivates a securityconscious culture, empowering employees across functions and regions with cybersecurity knowledge and practices. This initiative promotes collaboration and resilience, setting a remarkable industry standard for security awareness and education. Kudos to Xero for your commendable efforts.
FINALISTS
NOMINEES
Brock Roderick
Brock Roderick
Education Arcade
Xero’s Security Champions Program
Xero's Security Champions Program Ryan O'Connell IT Azure Trainer, Mentor
Ryan O'Connell Melonie Cole
Melonie Cole Mindshift
I S S U E 18
WOMEN IN SECURITY MAGAZINE
133
REVOLUTIONISING CYBERSECURITY EDUCATION: EDUCATION ARCADE TAKES CENTRE STAGE AT THE 2023 NEW ZEALAND WOMEN IN SECURITY AWARDS In a resounding recognition of innovation in
in web browsers. Each experience focuses on
cybersecurity education, Education Arcade secured
common security threats individuals face daily, and
the coveted Most Innovative Educator award at
weaves a narrative with two or three key learning
the 2023 New Zealand Women in Security Awards.
objectives. The interactivity and visual appeal of
This recognition is testament to the ground-
these game-based learning experiences contribute
breaking efforts of Education Arcade in reshaping
to their memorability, ensuring users retain essential
the landscape of online safety education through
cybersecurity knowledge.
gamified e-learning.
LEVERAGING A GAME DEVELOPMENT ENGINE Education Arcade, a passionate organisation with a
While gamification in education is not a novel
singular objective, has set out to make cybersecurity
concept, Education Arcade distinguishes itself by
awareness education not only simple and engaging
building content in a game development engine,
but also memorable. It employs the power of
setting a new standard for gamification and content
gamification, offering a suite of educational tools that
interactivity in the industry.
includes games, trivia quizzes and a non-fungible token (NFT) investment scam simulator.
One of its key innovations is the democratisation of gamified learning. Traditionally, such learning
134
At the heart of Education Arcade’s innovative
experiences were designed primarily for enterprise
approach is its use of the latest 2D game
clients with substantial budgets. Education Arcade
development engines that enable the creation of
offers its content free to the general public, schools
gamified learning experiences directly playable
and non-profits.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Winner
The impact of Education Arcade is evident in the
Overcoming time constraints and technical
widespread adoption of its educational tools. Its
limitations, Education Arcade has achieved
content is used in multiple schools and school
recognition and made significant contributions
districts globally. There are approximately 2,000
to cybersecurity education. Networking with the
regular, monthly, users in the USA, UK, Canada,
wider security community has been a priority. This
Australia and New Zealand. Furthermore, Education
has been achieved through participation in annual
Arcade’s initiatives have been cited in various studies
cybersecurity conferences, contributions to infosec
as examples of best practice in cybersecurity
magazines, appearances on security podcasts
education, validating their efficacy.
and presentations on gamified security learning to community groups.
A standout initiative from Education Arcade is the NFT investment scam simulator which has garnered
Education Arcade’s journey exemplifies the
significant success, reaching approximately 300,000
transformative power of innovation in education,
people to date. By leveraging the tools used by NFT
ensuring cybersecurity awareness becomes
scammers, Education Arcade delivered sound advice
accessible, engaging and memorable for learners
on spotting and avoiding scams in the crypto/NFT
from all walks of life. The Most Innovative Educator
space, turning the tide against fraudulent activities.
award at the 2023 New Zealand Women in Security Awards recognises Education Arcade’s commitment
A COMMITMENT TO FREE EDUCATION
to revolutionising cybersecurity education.
Behind this remarkable initiative is a single individual, also an information security manager in one of New Zealand’s public services, dedicating
www.linkedin.com/company/education-arcade
evenings to continuously improve the free offering. Despite relying solely on sponsorship funding, Education Arcade remains committed to offering free, high-quality cybersecurity education to the wider community.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
135
Unsung Hero WINNER
Mahsa McCauley As a prominent figure in AI and Cyber Security, you are actively fostering diversity within the tech sector through your work with She Sharp. Your dedication to shattering barriers and opening doors for underrepresented individuals, as well as your impressive research contributions and mentorship, are highly regarded. Driven by your vision of a world where technology benefits all, you maintain an unwavering commitment to creating a more inclusive tech landscape that values and empowers everyone.
HIGHLY COMMENDED
Olivia Uhrle For your exceptional contributions to the tech industry, coupled with your remarkable resilience in overcoming challenges, truly set you apart. Your commitment to driving change and mentoring LGBTQIA+ individuals at the University of Auckland, guiding them toward opportunities in cybersecurity, is commendable. And your unwavering dedication to bridging gender gaps in the tech sector, particularly by empowering women, remains a beacon of hope for the industry's muchneeded transformation.
FINALISTS
Izzi Lithgow
Lou Wheeley
SafeAdvisory
Olivia Uhrle
Mahsa McCauley She Sharp
Maniaiwaho Phillips
Maniaiwaho Phillips
Abby Zhang
New Zealand Defence Force
Olivia Uhrle Quantum Security Services
Robyn Campbell PwC NZ
136
NOMINEES
W O M E N I N S E C U R I T Y M A G A Z I N E
Cat Salanguit Kathryn Barker Izzi Lithgow
Georgia Kitt‑Lobo Robyn Campbell Tiffany Chu Mahsa McCauley Remya Kumar Yolanda Wilke
Vanessa Leite Monica Makau Barbara McLaughlin Coco Liu Lisa Haselton Chloe Ashford Amaryah Halo
J A N U A RY • F E B R U A RY 2024
DR. MAHSA MCCAULEY: PIONEERING DIVERSITY IN TECH AND BEYOND
In the world of technology and beyond, Dr. Mahsa McCauley stands out as a trailblazer, recently recognized with the Unsung Hero award at the prestigious 2023 New Zealand Women in Security Awards. While her formal role as a Senior Lecturer and Director of Women in Tech at AUT’s School of Computer, Engineering, and Mathematical Sciences is noteworthy, her contributions extend far beyond the academic sphere. Dr. McCauley is a luminary in Artificial Intelligence (AI) and Cyber Security, wielding her influence to champion diversity and inclusion in the tech industry. At the helm of the charitable trust She Sharp, she has orchestrated heroic and unsung efforts to empower women in technology, leaving an indelible mark on the industry. Through She Sharp, Dr. McCauley has constructed a platform where women in STEM can connect, develop skills, and interact with female role models. Her initiatives include workshops, events, and a tireless campaign to dispel misconceptions about the industry. The impact of these efforts has been transformative, dismantling barriers and fostering a more diverse and inclusive tech landscape.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
137
What sets Dr. McCauley apart is her exceptional dedication to promoting diversity and inclusion. She has devoted close to a decade to empowering women in tech, providing resources, connections, and dismantling stereotypes. Her leadership in AI and security, coupled with her tireless commitment to her work, makes her truly deserving of the Unsung Hero award. Dr. McCauley’s inspiration stems from her belief in technology’s potential to create a better world. She envisions a tech landscape where diversity and inclusion are integral, understanding that these elements are essential for innovation and ethical advancements. Her tireless efforts are fueled by a passion to create a world where everyone, irrespective of gender or background, can thrive in the tech industry. Driven by the potential she sees in every individual, she remains a relentless advocate for a more equitable and just tech future. Her commitment to this cause has not gone unnoticed. Dr. McCauley’s accolades include winning
www.linkedin.com/in/mahsamohaghegh
the Emerging Leader category in the 2013 Westpac Women of Influence Awards and the Champion Award at the 2019 YWCA Equal Pay awards. In 2022, She Sharp, under her leadership, secured the Best Industry Initiative Supporting Diversity, Inclusion, and Equality at the Women in Security awards. Undoubtedly, Dr. McCauley’s journey has not been without its challenges. Balancing nearly a decade of voluntary work with her formal role, family commitments, and the challenges of promoting diversity has demanded a heroic effort. Her husband and 7-year-old daughter, often present at She Sharp events, underscore the family’s collective dedication to the cause. While Dr. McCauley is not directly involved in the security industry, her leadership in AI and security research is commendable. Numerous research papers published in esteemed journals and conferences attest to her expertise. She has mentored and supervised countless students, contributing significantly to their success.
138
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
advanced
behavioural
cyber threat detection Spark DDoS is now backed by Radware, a global leader with more than 12,500 customers. Learn more
Cybersecurity Champion WINNER
Denise Carter-Bennett Datacom New Zealand
Denise's journey from Cybersecurity Analyst to Engineer at Datacom showcases her professional excellence and advocacy. With over 20 years of ethical hacking experience, she has made significant contributions to security practices. Denise's commitment extends to supporting women and gender minorities in security through NZNWS. Her personal journey as a neurodivergent individual serves as an inspiration to others. Denise's public speaking, community engagement, and thought leadership further highlight her role as a cybersecurity advocate. Her contributions are commendable and deserving of this award.
HIGHLY COMMENDED
Katja Feldtmann Cybershore
140
W O M E N I N S E C U R I T Y M A G A Z I N E
Katja's remarkable journey from hospitality to cybersecurity, highlighted by founding her firm 'Cybershore,' demonstrates excellence and innovation. Her dedication to community involvement and mentoring future cybersecurity experts is commendable. Despite challenges as an immigrant, Katja advocates for diversity and equal opportunities in the field. Her academic achievements, industry certifications, and recommendations from peers reflect her expertise. Katja's collaborative approach shifts perceptions of IT security and encourages compliance, inspiring others to pursue careers in cybersecurity and contributing to a more robust cybersecurity landscape in New Zealand.
J A N U A RY • F E B R U A RY 2024
SPECIAL RECOGNITION
Robyn Frye Workday
Robyn is a dedicated leader in diversity and inclusion, driving initiatives such as promoting women and allies and leading the New Zealand chapter for Women at Workday EEC. With a team that's around 40% female, she is actively fostering diversity and skill development through role rotation programs. Robyn's innovative thinking, exemplified by the midlevel career rotation program, sets her apart as a leader, demonstrating a commitment to challenging norms and creating positive change.
FINALISTS
NOMINEES
Cherry Liwag
Hana Bouafif
Mikala Easte
Spark NZ
Akarsha Palle
Monisha George
Antoinette Murray
Nerina Donnelly
Anusha Chappidi
Robyn Frye
Cherry Liwag
Sarah Burgess
Denise Carter-Bennett
Sarah Williams
Cybershore
Eponine Pauchard
Swati Singh
Robyn Frye
Georgia Strongman
Tahira Begum
Workday
Jen Fabian
Teodora Bear
Sarah Burgess
Jenna Whitman
Tina Bautista
Kat Lennox-Steele
Vanita Parbu
Katja Feldtmann
Yolanda Wilke
Denise Carter-Bennett Datacom New Zealand
Jenna Whitman Callaghan Innovation
Katja Feldtmann
Xero
Sarah Williams Cybercure
Tahira Begum Fidelity Life Insurance
I S S U E 18
WOMEN IN SECURITY MAGAZINE
141
CHAMPIONING CYBERSECURITY: DENISE CARTERBENNETT'S IMPACTFUL JOURNEY In a triumphant recognition, Denise Carter-Bennett secured the prestigious Cybersecurity Champion award at the 2023 New Zealand Women in Security Awards. Her journey, marked by technical excellence, diversity advocacy, and community engagement, paints a vibrant picture of a cybersecurity professional whose influence transcends the boundaries of her role.
A CYBERSECURITY TRAILBLAZER Denise, a Cybersecurity Engineer based in Auckland, New Zealand, brings a wealth of expertise and passion to her role. Joining Datacom in 2021 as a Cybersecurity Analyst, her outstanding performance swiftly propelled her into the position of a Cybersecurity Engineer in 2022. In this role, she not only oversees project work but also lends her expertise to shaping robust security architectures. With over two decades of experience as an ethical hacker, specialising in open source intelligence and malware analysis, Denise’s journey is a testament to
(NZNWS), Denise plays a pivotal role in supporting
her commitment to fortifying cybersecurity practices.
and advocating for individuals interested in various security domains. Her commitment to uplifting
142
EMPOWERING WOMEN AND MINORITIES
women and gender minorities is evident in her active
Denise’s impact goes beyond her professional
involvement in NZNWS, where she champions
achievements. As a Trustee and Chapter Lead for
diversity in cybersecurity, defense security, physical
the New Zealand Network for Women in Security
security, and information security.
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
UNREALIZED POTENTIAL AND UNIQUE CONTRIBUTIONS Denise’s journey, marked by diagnoses of autism and ADHD, is a testament to her resilience and determination. Embracing her neurodivergent qualities, she found her calling in the exhilarating realm of ethical hacking. Late-night adventures uncovering vulnerabilities and collaborating with affected parties exemplify her dedication to enhancing cybersecurity practices. Denise’s story inspires aspiring professionals, especially those who identify as neurodivergent, showcasing the transformative power of embracing one’s unique qualities.
EXCELLENCE IN PUBLIC SPEAKING AND THOUGHT LEADERSHIP
Achievement Award, Denise’s achievements underscore her significant contributions.
Denise’s influence extends to the public sphere, where she has emerged as a keynote speaker at
OVERCOMING CHALLENGES
various prominent events. Notable achievements
Denise’s journey as a neurodivergent, Maori wahine,
include being the Closing Keynote Speaker at the
and a single mother has been marked by substantial
NZ Cyber Security & Risk Summit, the Indigenous
challenges. Yet, her resilience and commitment
Advocate of the Year at DEFSEC, and a speaker
have propelled her to senior engineer status in a
at KawaiiCon. Her upcoming engagements at
cybersecurity team. Her achievements are not only
the Phishing Symposium and the 19th Annual
reflected in certifications but also in the positive
International Conference for Women Scientists
feedback from her employer, customers, and the
and Engineers affirm her influential presence in
broader NZ security community.
the industry.
DESERVING RECOGNITION COMMUNITY ENGAGEMENT AND VOLUNTEERING
Denise’s journey, from overcoming personal
Denise’s commitment to community growth is
demonstrates the quality, scale, and difficulty of
evident in her role as a Chapter Lead and Trustee for
her achievements. Her commitment to excellence,
NZNWS. Beyond organisational roles, her voluntary
innovation, and community engagement positions
contributions extend to initiatives like Ko Māui
her as a deserving recipient of the Cybersecurity
Hangarau, where she contributed to educating over
Champion award.
challenges to becoming a cybersecurity trailblazer,
100 children. Her involvement in moderating and participating in various events as the NZNWS Lead
Denise Carter-Bennett’s story is one of inspiration,
showcases her dedication to fostering knowledge
advocacy, and transformative impact. Her journey
sharing and community growth.
speaks to the potential within diversity, and her contributions to the cybersecurity industry make
AWARDS AND RECOGNITIONS
her an exceptional and deserving recipient of the
Denise’s impact has garnered recognition from
Cybersecurity Champion award.
various quarters. From being a DEFSEC Women In Security Award Winner to receiving scholarships and nominations for awards like the Harakeke
I S S U E 18
www.linkedin.com/in/denisecarterbennett
WOMEN IN SECURITY MAGAZINE
143
ROBYN FRYE: SPECIAL RECOGNITION FOR CYBER SECURITY CHAMPION Special recognition for Cyber Security Champion in the 2023 New Zealand Women in Security Awards went to Robyn Frye, VP, cybersecurity governance, risk and compliance in the Auckland office of Workday, a global company headquartered in the US, that develops and provides cloud-based human resources and financial management systems for large businesses. She has been in the role since 2019 after moving from the company’s head office in her native California a couple of years earlier. Robyn has been recognised as Cyber Security Champion for her efforts and standout achievements in building a diverse team and helping Workday employees of all genders and backgrounds to grow their careers. Robyn is a leader people want to work with and for. She faces challenges head on and fosters and encourages open, transparent conversations. She is passionate about coaching people who are in the early stages of their careers and/or wanting to transfer into cybersecurity.
A GENDER DIVERSE SECURITY TEAM Her own team is testimony to her achievements: it is the most gender diverse security team in Workday, globally, being 40 percent female and with 50 percent of leadership positions held by women.
144
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
RECRUITING FROM DIVERSITY As a hiring manager she is dedicated to using programs that allow for talent to enter cybersecurity and technology roles through non-traditional recruiting paths, such as a veterans’ program, people returning to the workforce after a few years absence, and individuals who have gone through trade programs. She says some of her best hiring decisions have come from focusing on the possibilities of people rather than their written qualifications. She describes herself as a ‘servant leader’: “known for inspiring teams to reach beyond their known Robyn likes to challenge norms and think ‘outside
capabilities to deliver security innovations and
the box’ when it comes to solving challenges.
continue to mature and who invests in individuals to
An example of this is her formation of a program
propel their career and life’s work in meaningful and
to rotate individuals in mid-level career roles.
personal ways.”
Other specific initiatives she has undertaken at Workday include: www.linkedin.com/in/robynfrye
• co-sponsoring an internal Workday group for cybersecurity women, known as SHEild; • being an executive sponsor of the New Zealand chapter for Women @ Workday Employee Belonging Council, and a panelist for Workday’s International Women’s Day events; • being site leader for Workday’s Auckland office which is home to 200 employees and approximately 20 security employees; • helping to design and develop a rotation program to support skill development and career mobility. This program transitions Workday employees (Workmates) fully out of their current role and fully immerses them in another role for three to six months to cultivate new skills, transfer knowledge and build bridges across silos. Half of the participants are female, and the program helped one woman shift from a SOC analyst role to become public sector compliance lead. Robyn believes diversity is critical in cybersecurity. She believes differences of experience, background and ways of thinking helps foster diverse perspectives, which drive the best outcomes and solutions.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
145
Best Security Mentor WINNER
Michelle Crowe Michelle's dedication to empowering others to build confidence and develop their abilities is driven by a belief in the significance of lifelong learning and gratitude for those who have inspired her. Her selfless imparting of a wealth of knowledge in the security field, particularly as an intimate mentor focusing on individual needs and career development, positions her as an inspiring and empowering mentor, especially for women in the industry. Michelle's commitment to nurturing future generations is truly deserving of recognition.
SPECIAL RECOGNITION
Hilary Walton Hilary's exceptional commitment to mentoring has left a lasting impact on the professional development of many individuals. Going beyond traditional career guidance, she emphasises personal brand building and holistic skill development. Hilary's approachability, industry expertise, and dedication to mentoring, even amidst her busy schedule, are commendable. Her mentorship has empowered mentees, particularly women, fostering gender equality in the field.
FINALISTS
Hilary Walton Microsoft
Lana Tosic Relevant Security Consultant
Michelle Crowe Xero
Tamara Al-Salim New Zealand Defence Force
NOMINEES
Lana Tosic
Michelle Crowe
Anna Thomson
Monica Makau
Dean Navarro
Paul Platen
Hilary Walton
Tamara Al-Salim
Jaco Du Toit
Vanessa Piper
Jan Thronborough
Wendy Bennett
Laura Smith
Vanessa Piper CyberCX
146
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
MICHELLE: GUIDING LIGHTS IN CYBERSECURITY - BEST SECURITY MENTOR AT THE 2023 NZ WOMEN IN SECURITY AWARDS In the realm of cybersecurity, Michelle stands out as a beacon of guidance and mentorship, earning her the esteemed title of Best Security Mentor at the 2023 New Zealand Women in Security Awards. Currently serving as Team Lead at Xero, and having previously held the position of Director of Tech Ops at InPhySec Security, Michelle’s formal role places her in a privileged position where she actively mentors and encourages young individuals in the security industry, with a particular focus on empowering young women. With a career spanning over 13 years, Michelle’s role involves both people and operational leadership activities. Her journey began in the UK Civil Service, where, for over a decade, she coached and mentored younger women, specifically those navigating the complexities of public sector security. Transitioning to New Zealand, Michelle’s leadership roles have provided her with a platform to extend her mentorship to a diverse range of individuals.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
147
Michelle’s mentoring journey, evolving over the past 7-8 years, is characterised by a deep understanding of the security industry and a focus on the unique needs and careers of her mentees. Despite her relatively short time in New Zealand, Michelle has worked with individuals between the ages of 20 and 30, many of whom struggled to find their footing in the security industry. Her mentorship approach is both formal and informal, involving career development discussions and personal developmentfocused interactions. One notable quality that sets Michelle apart is her personalised approach to mentoring. She tailors her guidance to the individual needs of her mentees,
In recent years, Michelle has shifted her focus to
helping them navigate the complexities of the
mentoring students and graduates entering the
cybersecurity landscape. Her impact is evident in the
security industry. Her dedication to helping young
success stories of those she has mentored.
women find their voice and confidence in the often competitive industry demonstrates her commitment
One such success story is Hazel Schapel, a young
to fostering diversity and inclusion.
woman in tech, who emphasises the incredible help she received from Michelle’s mentorship. According
What sets Michelle apart is her ability to break down
to Hazel, Michelle’s guidance was instrumental in
concerns into manageable topics, making them
navigating the intricate path of the cybersecurity
easy to tackle without losing sight of the bigger
industry and understanding what it means to have a
picture. Her work ethic and composed demeanor
career in tech. Michelle’s reassurance and thoughtful
leave a lasting impression, showcasing her as a
advice during pivotal career decisions left a lasting
role model in the industry. Michelle’s values-driven
impact on Hazel, highlighting Michelle’s commitment
approach, emphasis on lifelong learning, and diverse
to nurturing talent.
background contribute to her ability to inspire and empower young individuals, particularly women, in
Michelle’s mentoring extends beyond career
the cybersecurity field.
development discussions; she has actively supported individuals facing specific challenges. One notable
For Michelle, mentorship is not just a role but
example is a young woman with dyspraxia who,
a passion rooted in the belief that continuous
despite being overlooked for promotion multiple
development leads to a fulfilling life. She sees
times, achieved a promotion within 12 months of
mentorship as a way to enable and encourage
Michelle’s mentorship. Michelle’s guidance helped
others to embark on their own learning journeys.
her develop self-awareness, identify opportunities
Grateful for the inspiration and investment in her
for growth, and build confidence in her interactions
own development, Michelle feels a deep sense of
with colleagues.
responsibility to pay it forward. Her motivation lies in witnessing the confidence and abilities of those she
Another mentee struggling with self-confidence found
mentors blossom, propelling her to contribute even
a mentor in Michelle. Through their collaboration,
more to the world of cybersecurity mentorship.
the mentee not only developed confidence but also applied for and secured a role above her current grade, involving people management responsibilities.
148
W O M E N I N S E C U R I T Y M A G A Z I N E
www.linkedin.com/in/michelle-crowe-nz
J A N U A RY • F E B R U A RY 2024
Source2Create Spotlight
Podcasts
We can GENERATE LEADS from your PODCAST
We can SCRIPT & CREATE your PODCAST
We can ADVERTISE & SOCIALISE your PODCAST
5 SERIE S PODCA ST AUD$10 ,000 Ex GST
REACH OUT TODAY
charlie@source2create.com.au
aby@source2create.com.au
Best Industry Initiative that supports Diversity, Inclusion, and Equality WINNER
OMGTech We exemplify the Pam Fergusson Charitable Trust's unwavering commitment to empowering communities and nurturing young minds with vital technological skills. Your unique bond with the tech industry enables you to forge seamless pathways between education and technology, paving the way for Aotearoa's youth to become future innovators and leaders.
HIGHLY COMMENDED
ISACA Auckland Chapter We commend ISACA Auckland for your exceptional contributions through the She Leads Tech initiative. This program has empowered women in cybersecurity and ignited global conversations on gender diversity in tech leadership. Your unwavering commitment to inclusivity and mentorship leaves a lasting impact, exemplifying the positive influence of volunteerism and mentorship, inspiring us to strive for a more inclusive future.
FINALISTS
NOMINEES
OMGTech
Women+ in Cyber
SheLeadsTech
Pam Fergusson Trust
Deloitte
#10KWomen initiative
SheLeadsTech
#10KWomen initiative
ISACA Auckland
Microsoft
Women+ in Cyber OMGTech AWS CloudUp
150
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
EMPOWERING THE FUTURE: OMGTECH! RECEIVES BEST INDUSTRY INITIATIVE AWARD AT THE 2023 NEW ZEALAND WOMEN IN SECURITY AWARDS In a triumph for education and inclusivity, OMGTech! secured the Best Industry Initiative for Young Individuals in IT Security at the 2023 New Zealand Women in Security Awards. This recognition is not just an accolade; it’s a testament to the impactful work of The Pam Fergusson Charitable Trust, the driving force behind OMGTech!
FOUNDING VISIONARIES Established in 2014, The Pam Fergusson Charitable Trust carries a legacy of empowerment through technology. Founded by Vaughan Fergusson
ADAPTING TO CHALLENGES
and Zoe Timbrell, with support from Vaughan’s
With the onset of COVID restrictions, public-facing
brothers Shawn and Jonathan Fergusson, the trust
events took a back seat for the Pam Fergusson
pays homage to their mother, Pam. A paraplegic
Charitable Trust. However, the Trust continued
unemployed solo mum, Pam connected her sons
its impactful work through specific programs,
with technology in the ‘80s, changing their lives. The
such as the Indigenous Game Design programme
Trust’s vision is clear—to teach communities, kaiako
delivered in-schools and underserved communities,
(teachers) and tamariki (children) how to harness
professional learning and development courses for
technology, transforming them into the innovators
teachers, enviro-tech school camps and industry-
and leaders of tomorrow.
sponsored events.
I S S U E 18
WOMEN IN SECURITY MAGAZINE
151
challenged, have opportunities for personal growth as well as being empowered through science, design, and creativity, to change the world around them for the better. While on camp, students work on “Secret Projects” that solve a problem for the community. It could be monitoring the waterways for pollutants, tracking pests in the bush, measuring CO2 in the air or growing organic food. Each project is designed by industry experts and then built and run by groups visiting the camp. The camp also hosts corporate retreats and the profits are used to sponsor schools who otherwise cannot afford to come on camps.
FOSTERING DIVERSITY AND INCLUSION One noteworthy virtual event, funded by Microsoft
A standout feature of OMGTech! initiatives is the
NZ in collaboration with Netsafe, educated hundreds
commitment to diversity and inclusion. All events
on topics like fake news, deepfakes, metadata, and
maintain a strict ratio of 50% women, girls, and
online safety. DigiGirls, a group within Microsoft NZ,
individuals of minority genders. There is a special
provided crucial support for this initiative.
emphasis on engaging Māori and Pasifika kids, recognizing and addressing the underrepresentation
Another standout was a series of live-streamed
of these groups in the technology sector in Aotearoa.
bilingual events, reaching nearly 3000 girls and non-binary young people across Aotearoa. The
CONNECTING EDUCATION AND INDUSTRY
events aimed to bridge the technology gap, engaging
What truly sets OMGTech! apart is its extensive
school-aged children and providing valuable insights
network and collaboration with the industry. Few
into the world of tech.
charities in Aotearoa have managed to establish such seamless connections between the education sector
OMGTECH!: BRIDGING GAPS AND INSPIRING FUTURES
and the tech industry. The aim is clear—to create
OMGTech! is at the forefront of the Trust’s initiatives,
(child), towards a future enriched by technology.
offering schools and kura (educational institutions)
Workshops are conducted nationwide, mirroring the
across Aotearoa access to award-winning
omnipresence of technology itself.
pathways that effortlessly guide every tamariki
workshops. These workshops, open to anyone from students to parents and the wider public, inspire and
OMGTech! stands as a beacon of empowerment,
educate participants on future technologies.
bridging gaps, and paving the way for a diverse and inclusive future in the tech industry. The recognition
Since 2019, the Trust has been running the
at the 2023 New Zealand Women in Security Awards
workshops as part of school camps at the Insititute
is a testament to their commitment and the positive
of Awesome, an enviro-tech camp immersed in the
impact they’ve had on countless lives.
native bush of Whāingaroa (Raglan). The workshops teach technology skills within an environmental context and allow students to be be physically
152
W O M E N I N S E C U R I T Y M A G A Z I N E
omgtech.co.nz
J A N U A RY • F E B R U A RY 2024
Best Place to Work in Security WINNER
Spark New Zealand
Spark NZ's remarkable commitment to gender diversity and inclusion within the security domain is truly commendable. Achieving gender representation in all security roles is just one facet of their initiatives. The company actively supports employees in pursuing certifications and upskilling. Their strategic focus on diversity and inclusion, along with the Blue Heart program, empowers everyone to create positive change. Spark NZ's efforts in training on bias elimination, promoting inclusive language, and fostering a culture where all voices matter are exemplary. The organization has created an equal opportunity environment where authenticity and inclusion thrive.
FINALISTS
NOMINEES
Datacom
Cianaa Technologies
Outfox (Formerly Intelligensia)
CyberCure
PwC New Zealand
Datacom Cyber Defence Operations Centre
Spark New Zealand
DEFEND Deloitte NZ Intelligensia Ltd PwC NZ Quantum Security Services Spark NZ Workday
I S S U E 18
WOMEN IN SECURITY MAGAZINE
153
SPARK NZ: PIONEERING DIVERSITY AND INCLUSION IN IT SECURITY
In a resounding victory, Spark NZ clinched the
company’s emphasis on diversity and inclusion
title of Best Place to Work in IT Security at the
(D&I) is not a peripheral aspect of its operation; it is
esteemed 2023 New Zealand Women in Security
seamlessly woven into the core business strategy.
Awards. This recognition underscores Spark’s
Through ambitions with measurable goals, Spark
unwavering commitment to fostering diversity and
ensures accountability, setting a high standard for
inclusion, making it a beacon of excellence in the
its workforce.
security industry. A standout initiative is the Blue Heart program,
154
Central to Spark’s success is a suite of initiatives
a grassroots movement that democratises D&I
meticulously designed to eliminate gender bias
within Spark. Each employee, upon joining, takes
in recruitment and promotion practices. The
the ‘Blue Heart Pledge’ creating a collective sense
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
of ownership. The Blue Heart Kaupapa (a Māori
data sharing. Spark’s annual report provides
term for principle or policy) sets behavioural
insights into the progress made, with a focus on
standards and values and fosters a culture of
continuous improvement.
belonging. It prioritises achievement, self-awareness, encouragement and collaboration, creating
Spark recognises that diversity is not a checkbox
a platform that enables women from diverse
but an ongoing commitment. The company actively
backgrounds to excel.
seeks partnerships and runs internal programs like Spark Gigs, an internship program, and Spark
The People and Culture team collaborates with
Women in Tech to empower and upskill women in
leaders, offering resources, standards and guidelines
the organisation.
for diverse hiring. This approach ensures Spark strives for diversity when assessing candidates.
Despite progress, Spark acknowledges the
The impact of these initiatives on the workforce
challenges it faces to increase female representation,
and workplace culture is profound, creating
particularly in technology-focused roles. To address
an environment where everyone feels valued
these challenges, Spark collaborates with industry
and empowered.
peers and external institutions to support the creation of a nationwide pipeline for women in
COMMITMENT TO MĀORI AND PASIFIKA REPRESENTATION
technology careers.
Spark’s focus extends beyond gender diversity to
Spark NZ’s success sends a resounding message
ethnic diversity. Approximately 83 percent of Spark’s
to the industry about the importance of prioritising
workforce have shared their ethnicity, enabling
diversity and inclusion. By measuring progress,
transparent reporting across leadership levels.
fostering a data-led approach and actively
The commitment to increasing Māori and Pasifika
addressing challenges, Spark has become a
representation reflects Spark’s dedication to a
model for inclusive and diverse workplaces in the
diverse and inclusive workforce.
security industry.
Spark sets specific targets, such as achieving 40:40:20 representation Spark-wide, reducing the gender pay gap, and encouraging ethnicity
NEW ZEALAND WOMEN IN SECURITY AWARDS 2023
I S S U E 18
www.linkedin.com/company/spark-new-zealand
www.instagram.com/sparknz
Thank you to our judges WOMEN IN SECURITY MAGAZINE
155
Best Innovative Business "Reshaping the future" of the Security Industry WINNER
Xero
156
Your Security Champions program is a gamechanger in the face of rapid growth and evolving threats. It empowers employees to become cybersecurity guardians, fostering awareness and proactive risk identification. Xero's commitment to reshaping the security industry through knowledge sharing underscores your dedication to fostering a strong security culture across the sector and is truly commendable.
FINALISTS
NOMINEES
Mindshift
Mindshift
Xero - Security Champions Program
Xero - Security Champions Program
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
XERO LEADS THE WAY: BEST INNOVATIVE BUSINESS AT THE 2023 NEW ZEALAND WOMEN IN SECURITY AWARDS In a triumph for innovative cybersecurity practices, Xero clinched the prestigious Best Innovative Business award at the 2023 New Zealand Women in Security Awards. This recognition underscores Xero’s commitment to helping advance the future of the security industry through groundbreaking initiatives that go beyond traditional norms. Xero, a globally acclaimed accounting software platform, has been at the forefront of empowering
The Security Champions program distributes security
small businesses and their advisors to flourish. As
responsibilities across the organisation, ensuring
the company remains focused on balancing growth
that everyone is actively involved in protecting
and profitability across its global markets, releases
data, systems, and assets. Instead of viewing
products and feature updates for customers, the
security as an isolated function, Xero wanted to
importance of security has never been more intense.
make it everyone’s responsibility. This innovative approach is a response to the ever-evolving nature
Recognizing that security cannot be the sole
of cyber threats and the need to adapt to a dynamic
responsibility of the Xero Security team as the
business landscape.
business expands, the organisation embarked on a transformative journey. This journey gave rise to a
At the core of the Security Champions program is a
culture change initiative to further t embed security
commitment to educate and empower employees.
across all functions and regions. The result: the
The program goes beyond conventional cybersecurity
Security Champions program, a groundbreaking
measures, addressing specific challenges and issues
endeavour that sets Xero apart in reshaping the
faced by the organisation. It seeks to humanise
landscape of the security industry.
security, creating a positive and inclusive security
I S S U E 18
WOMEN IN SECURITY MAGAZINE
157
culture where employees feel empowered, informed,
Undoubtedly, the Security Champions program
and motivated to play an active role in protecting the
challenges traditional norms in the cybersecurity
organisation’s assets and data.
realm. The program’s success metrics, including program growth, training participation and
One of the pivotal aspects of this program is the
compliance, and meetup attendance, are tracked
emphasis on reducing risk by educating employees
through a data visualisation dashboard. The impact is
on cybersecurity best practices. Xero recognized
evident in the program’s high Annual Security training
the importance of proactive employee engagement
Compliance at Xero.
to identify and mitigate potential threats. By appointing and developing Security Champions
The benefits of this innovation extend far beyond
within the organisation, Xero ensures that security
Xero’s immediate sphere. Security champions
is considered from the start and is not treated as
embedded in different teams act as the organisation’s
an afterthought.
frontline defence, identifying and responding to emerging threats. Xero’s proactive approach to
In terms of innovation, the Security Champions
security encourages a culture of continuous learning,
program stands out with its collaborative approach.
ensuring that employees stay informed about the
Champions from different departments collaborate
latest trends and best practices.
regularly, sharing insights, challenges, and best practices. This collaborative spirit extends to the
As Xero continues to influence the future of the
incorporation of gamified training and challenges
security industry, the Security Champions program
using the Secure Code Warrior training platform,
is set to have a far-reaching impact. It serves as
engaging over 700 Xero engineers.
a model for other organisations looking to instill a robust security culture, fostering proactive
What truly sets Xero apart is its commitment to
engagement and collaboration. By investing in its
share learnings, successes, and insights with the
employees’ development and creating a capable
wider industry. Xero actively participates in forums,
and knowledgeable workforce, Xero is not just
meetups, informal catch-ups, and conferences,
securing its own future but contributing to the overall
contributing to positive change in how organisations
advancement of cybersecurity practices.
educate their employees on cybersecurity. This outreach is a testament to Xero’s dedication to fostering a strong security culture not just within its
www.linkedin.com/company/xero
walls but across the industry.
158
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Want to sponsor an event but have no one to execute it? Need stand out booth designs? Merchandise & Prize giveaways Booth social media presence Booth set up and pack down Booth staffing Booth marketing
LET US HELP YOU OVERCOME YOUR EVENT MANAGEMENT CHALLENGES
We can execute anywhere in Australia, REACH OUT TODAY FOR AN INSTANT QUOTE. The team at Source2Create has all the necessary skills to get the job done for you, so your time can be reserved to focus on other things.
With:
aby@source2create.com.au charlie@source2create.com.au source2create.com.au
NEW ZEALAND WOMEN IN SECURITY AWARDS 2023
160
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Ph
hoto Wall
I S S U E 18
WOMEN IN SECURITY MAGAZINE
161
Most Outstanding in IT Security WINNER
Dila Beisembayeva Through a series of outstanding achievements, Dila is reshaping the security industry and leaving an undeniable mark. She has dedicated her life to the sector, displaying exceptional leadership, selflessness, and a deep commitment to empowering learners and supporting your colleagues. Your visionary approach and dedication to making a positive impact in the IT security industry in Aotearoa New Zealand are a testament to your outstanding contributions and mark you as an inspiring role model for the cybersecurity community.
HIGHLY COMMENDED
Jenna Whitman Jenna's outstanding contributions, dedication, expertise, and innovative spirit within the cybersecurity community are commendable. Her diverse skill set, spanning technology, investigations, and cyber expertise, combined with exceptional relationship-building, has positioned her as a trusted authority at all levels of the organization and within the industry. Jenna's active engagement in industry trends, aimed at enhancing cyber resilience and awareness, reflects her ongoing commitment and leadership.
FINALISTS
Dila Beisembayeva Te Pūkenga
Jenna Whitman Callaghan Innovation
Nicola Hermansson EY
Meaghan Bradshaw Microsoft
NOMINEES
Divya Narayan
Nancy Taneja
Anna Thomson
Jenna Whitman
Nicola Hermansson
Megan Young
Joanne Lu
Hajar Qanich
Dila Beisembayeva
Manvi Lall
Meaghan Bradshaw Tamāra al-salim
Tamāra al-salim New Zealand Defence Force
162
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
DILA BEISEMBAYEVA: SHAPING THE FUTURE OF IT SECURITY EDUCATION IN AOTEAROA
In the realm of IT security education, Dila
developing the NZ Diploma in Cybersecurity, Level
Beisembayeva’s exceptional leadership and
6 This innovative one-year program, launched on
transformative initiatives have garnered attention,
the eve of New Zealand’s first lockdown, redefined
making her richly deserving of being recognised as
traditional education structures by embedding an
New Zealand’s Most Outstanding In IT Security in
internship, providing hands-on experience and real-
the 2023 New Zealand Women in Security Awards.
world connections.
Dila’s journey began with her recognising the
However, the success of the NZ Diploma was not
global shortage of cybersecurity professionals.
sufficient for Dila. She observed a gap in Māori
Collaborating with industry giants like Datacom
and Pasifika representation. So, in her role as
and Spark Business Group she took the lead in
senior implementation lead, Micro-credentials at
I S S U E 18
WOMEN IN SECURITY MAGAZINE
163
Te Pūkenga (the New Zealand Institute of Skills
of learners, the increased enrolments and the
and Technology), she initiated a collaboration
businesses offering internships underscore the
with Microsoft, TupuToa (a non-profit that works
impact and relevance of her initiatives. Beyond
to increase Māori and Pacific representation in
recognition, these outcomes validate the success
leadership positions in New Zealand’s corporate
of Dila’s commitment to creating meaningful
sector), Te Whatu Ora (Health New Zealand) and the
opportunities.
Ministry of Social Development to create a 12-week cybersecurity micro-credential. This initiative, funded
A PASSION FOR COLLABORATION
by Microsoft and the Tertiary Education Commission,
What drives Dila is a passion for collaboration and
provided free training to a cohort comprising
her desire to make a positive impact. Working with
predominantly Māori and Pasifika learners, ensuring
like-minded individuals who share a common goal
equal opportunities for diverse groups in the
motivates her to innovate continuously. Challenges
cybersecurity sector.
are viewed as opportunities to push boundaries and develop solutions that address real-world needs in
A CHAMPION OF MICRO-CREDENTIALS
cybersecurity. Witnessing the tangible impact on
Leading and involving others in her initiatives has
learners and the industry drives her dedication to
been central to Dila’s success. Her collaborative
creating meaningful opportunities.
approach, her willingness to explore new ideas and her commitment to creating a supportive
Being recognised in the 2023 New Zealand Women in
environment empowers her team. The success of
Security Awards has been a humbling experience for
initiatives like the AWS re/Start micro-credential
Dila. Her recognition was the result of the collective
showcased not only the impact on learners but
efforts of her team and partners: a testament to the
also inspired colleagues to embrace innovation and
transformative potential of collaboration and the
contribute to positive change.
power of collective support and innovation to drive positive change.
Dila’s journey has not been without challenges. Proving to external partners that learners could
Dila’s outstanding leadership, commitment to
become work-ready in a shorter period than through
innovation and dedication to creating opportunities
other available courses challenged traditional
for learners make her a true pioneer in IT security
mindsets. Her resilience and determination to
education. Her journey, marked by resilience,
advocate for untapped talent reshaped perceptions,
collaboration and a passion for positive change,
demonstrating that individuals can excel with the
exemplifies the values celebrated by the New
right support and innovative programs.
Zealand Women in Security Awards.
The recognition of Dila’s work has been widespread. It is evident in the overwhelming response from
www.linkedin.com/in/dila-beisembayeva-470498169
learners and businesses alike. The success stories
164
W O M E N I N S E C U R I T Y M A G A Z I N E
J A N U A RY • F E B R U A RY 2024
Easy Reliable Resourceful No job is too big or too small. We look after your marketing & content needs so you can get on with what you do best. GET CONNECTED AND TAKE CONTROL OF YOUR BUSINESS SUCCESS TODAY!
charlie@source2create.com.au
aby@source2create.com.au
SAVE THE DATE
2024
10 OCT 2024
2024
WOMEN IN SECURITY AWARDS womeninsecurityawards.com.au www.womeninsecurityawards.co.nz
NEW ZEALAND WOMEN IN SECURITY AWARDS
SAVE THE DATE
7 NOV 2024