SlideShare a Scribd company logo
1 of 13
Download to read offline
Diversifying the workforce
Clare Johnson, University of South Wales @clareontherun
Preamble
Clare Johnson University of South Wales2
Gender Diversity
Clare Johnson University of South Wales3
Women in the workforce
• Women working: 46.5%1
• 28% of UK boards are women1
• Women working in IT: 17%2
• Women in cyber security:
• Between 11%3 and 20%4
• On our cyber courses:
Gender Diversity
Clare Johnson University of South Wales4
Women in the workforce
• Women working: 46.5%1
• 28% of UK boards are women1
• Women working in IT: 17%2
• Women in cyber security:
• Between 11%3 and 20%4
• On our cyber courses:
0
20
40
60
80
100
120
BSc
Comp
Forensics
BSc
Comp
Security
BSc
Applied
Cyber
MSc
Systems
Security
MSc
Cyber
Security
MSc
Comp
Forensics
Ratio of male to female students at USW
Male Female
Why is diversity important?
Clare Johnson University of South Wales5
• Jane Frankland – Women are more risk averse
• “Homogenous teams … can lead to stagnation” 5 (Malik, AlienVault)
• Diversity of cyber security challenges
• 30% of my LinkedIn followers are women
“If you’re short on women
you’re less safe”
(Frankland, 2017)
What is the problem?
Clare Johnson University of South Wales6
And how can we solve it?
• Lack of role models
• Organisational culture
• We hire people like ourselves
• Career breaks
• Women don’t apply for those jobs
• Job share
• Job advert – get a woman to write it
• Women on the panel and involved in the job sift
• Cultural change
Diversifying
in other
ways
University of South Wales
7
IT Security Example
Clare Johnson ⚬ University of South Wales8
Preparation
•IT Governance Board
•Scenario Planning
•Procedural Documents
!INCIDENT!
•Initial discovery
•Immediate actions for damage limitation
•Reporting
•All staff notified via email
Post
incident
analysis
•Lecturer visits site using VM
•Further analysis of site
•Staff awareness campaign initiated
Keylogging
Clare Johnson University of South Wales9
• Suspicious USB found in computer lab
• Handed to cyber team
• Visual inspection suggested home made keylogger
• Digital Forensics lecturer analysed files
• Device deployed for less than 5 days
• Information contained not accessed by anyone
• Two usernames and passwords captured
• Two staff usernames and passwords captured
• Discussions surrounding appropriate responses
Cyber Team
Clare Johnson University of South Wales10
What support can we provide?
• Support from teams
• Network specialist
• Web specialist
• Digital forensics specialist
• Staff communications
• Sounding board
• Penetration Testing
• Students
“Without true
diversity we are in
danger of group-
think behaviour”
Nicola Hudson
National Cyber Security Centre
customerservices@jisc.ac.uk
jisc.ac.uk
Thank you
Clare Johnson
Head of Cyber Security
clare.johnson@southwales.ac.uk
@clareontherun @uswcybers @womencyberwales
References
Clare Johnson University of South Wales13
Subheading
1. Catalyst, Quick Take: Women in the Workforce—UK (April 24, 2018)
2. Women in Tech: Available at: https://www.womenintech.co.uk (Accessed March 16, 2019)
3. Paine, L. (2017) New Research: In 2017, Women Still Only Make Up 11 Percent of the
Cybersecurity Workforce, Veracode, Available at: https://www.veracode.com/blog/new-
research-2017-women-still-only-make-11-percent-cybersecurity-workforce (Accessed
March 16, 2019)
4. Morgan, S. (2019) Women Represent 20 Percent Of The Global Cybersecurity Workforce
In 2019, Cybersecurity Ventures, Available at https://cybersecurityventures.com/women-in-
cybersecurity/ (Accessed March 16, 2019)
5. Ismail, N. (2018) Why is it important to build increasingly diverse security teams,
Information Age, Available at https://www.information-age.com/diverse-security-teams-
123474574/ (Accessed March 17, 2019)

More Related Content

Similar to Diversifying the workforce

Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersFrederick Lane
 
A guide to effective human resource management
A guide to effective human resource managementA guide to effective human resource management
A guide to effective human resource managementpantiyasa
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for EducatorsFrederick Lane
 
Introducing digital technologies into prisons: Issues and challenges
Introducing digital technologies into prisons: Issues and challengesIntroducing digital technologies into prisons: Issues and challenges
Introducing digital technologies into prisons: Issues and challengesHelen Farley
 
STUDY CYBER SECURITY IN AUSTRALIA
STUDY CYBER SECURITY IN AUSTRALIASTUDY CYBER SECURITY IN AUSTRALIA
STUDY CYBER SECURITY IN AUSTRALIAAECC Global
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Abigail Mizera
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2larsselect
 
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy WorkshopWelcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy WorkshopTyrone Grandison
 
ARLG London and South East presentation 11th december 2012 by emma bond
ARLG London and South East presentation 11th december 2012 by emma bondARLG London and South East presentation 11th december 2012 by emma bond
ARLG London and South East presentation 11th december 2012 by emma bondARLG London&SouthEast
 
Social Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoSocial Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoLeslie Hammersmith
 
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Test Security
 
Come to the library to learn how not to smile at a crocodile
Come to the library to learn how not to smile at a crocodileCome to the library to learn how not to smile at a crocodile
Come to the library to learn how not to smile at a crocodileRoxanne Missingham
 
Exploring the Paradox: Cheating in the Most Noble Profession
Exploring the Paradox: Cheating in the Most Noble ProfessionExploring the Paradox: Cheating in the Most Noble Profession
Exploring the Paradox: Cheating in the Most Noble ProfessionJames Cook University Online
 
Levelling the digital playing field with The Home Access Scheme
Levelling the digital playing field with The Home Access Scheme Levelling the digital playing field with The Home Access Scheme
Levelling the digital playing field with The Home Access Scheme Huw Davies
 
Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)
Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)
Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)Kevin Campbell-Wright
 

Similar to Diversifying the workforce (19)

Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
 
A guide to effective human resource management
A guide to effective human resource managementA guide to effective human resource management
A guide to effective human resource management
 
Security Measures in American Schools: Are Schools Safer?
Security Measures in American Schools: Are Schools Safer?Security Measures in American Schools: Are Schools Safer?
Security Measures in American Schools: Are Schools Safer?
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 
Introducing digital technologies into prisons: Issues and challenges
Introducing digital technologies into prisons: Issues and challengesIntroducing digital technologies into prisons: Issues and challenges
Introducing digital technologies into prisons: Issues and challenges
 
STUDY CYBER SECURITY IN AUSTRALIA
STUDY CYBER SECURITY IN AUSTRALIASTUDY CYBER SECURITY IN AUSTRALIA
STUDY CYBER SECURITY IN AUSTRALIA
 
Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017
 
Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2Cyber bullying powerpoint round 2
Cyber bullying powerpoint round 2
 
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy WorkshopWelcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
Welcome & Introductory Remarks - IEEE 2014 Web 2.0 Security & Privacy Workshop
 
ARLG London and South East presentation 11th december 2012 by emma bond
ARLG London and South East presentation 11th december 2012 by emma bondARLG London and South East presentation 11th december 2012 by emma bond
ARLG London and South East presentation 11th december 2012 by emma bond
 
Social Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoSocial Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research Demo
 
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
 
Come to the library to learn how not to smile at a crocodile
Come to the library to learn how not to smile at a crocodileCome to the library to learn how not to smile at a crocodile
Come to the library to learn how not to smile at a crocodile
 
Exploring the Paradox: Cheating in the Most Noble Profession
Exploring the Paradox: Cheating in the Most Noble ProfessionExploring the Paradox: Cheating in the Most Noble Profession
Exploring the Paradox: Cheating in the Most Noble Profession
 
Levelling the digital playing field with The Home Access Scheme
Levelling the digital playing field with The Home Access Scheme Levelling the digital playing field with The Home Access Scheme
Levelling the digital playing field with The Home Access Scheme
 
Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)
Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)
Implementing FELTAG: Meeting Learner Needs (main NIACE presentation)
 

More from Jisc

International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 
ExpertsknightOct23.pptx
ExpertsknightOct23.pptxExpertsknightOct23.pptx
ExpertsknightOct23.pptxJisc
 

More from Jisc (20)

International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 
ExpertsknightOct23.pptx
ExpertsknightOct23.pptxExpertsknightOct23.pptx
ExpertsknightOct23.pptx
 

Recently uploaded

QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 

Recently uploaded (20)

QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 

Diversifying the workforce

  • 1. Diversifying the workforce Clare Johnson, University of South Wales @clareontherun
  • 3. Gender Diversity Clare Johnson University of South Wales3 Women in the workforce • Women working: 46.5%1 • 28% of UK boards are women1 • Women working in IT: 17%2 • Women in cyber security: • Between 11%3 and 20%4 • On our cyber courses:
  • 4. Gender Diversity Clare Johnson University of South Wales4 Women in the workforce • Women working: 46.5%1 • 28% of UK boards are women1 • Women working in IT: 17%2 • Women in cyber security: • Between 11%3 and 20%4 • On our cyber courses: 0 20 40 60 80 100 120 BSc Comp Forensics BSc Comp Security BSc Applied Cyber MSc Systems Security MSc Cyber Security MSc Comp Forensics Ratio of male to female students at USW Male Female
  • 5. Why is diversity important? Clare Johnson University of South Wales5 • Jane Frankland – Women are more risk averse • “Homogenous teams … can lead to stagnation” 5 (Malik, AlienVault) • Diversity of cyber security challenges • 30% of my LinkedIn followers are women “If you’re short on women you’re less safe” (Frankland, 2017)
  • 6. What is the problem? Clare Johnson University of South Wales6 And how can we solve it? • Lack of role models • Organisational culture • We hire people like ourselves • Career breaks • Women don’t apply for those jobs • Job share • Job advert – get a woman to write it • Women on the panel and involved in the job sift • Cultural change
  • 8. IT Security Example Clare Johnson ⚬ University of South Wales8 Preparation •IT Governance Board •Scenario Planning •Procedural Documents !INCIDENT! •Initial discovery •Immediate actions for damage limitation •Reporting •All staff notified via email Post incident analysis •Lecturer visits site using VM •Further analysis of site •Staff awareness campaign initiated
  • 9. Keylogging Clare Johnson University of South Wales9 • Suspicious USB found in computer lab • Handed to cyber team • Visual inspection suggested home made keylogger • Digital Forensics lecturer analysed files • Device deployed for less than 5 days • Information contained not accessed by anyone • Two usernames and passwords captured • Two staff usernames and passwords captured • Discussions surrounding appropriate responses
  • 10. Cyber Team Clare Johnson University of South Wales10 What support can we provide? • Support from teams • Network specialist • Web specialist • Digital forensics specialist • Staff communications • Sounding board • Penetration Testing • Students
  • 11. “Without true diversity we are in danger of group- think behaviour” Nicola Hudson National Cyber Security Centre
  • 12. customerservices@jisc.ac.uk jisc.ac.uk Thank you Clare Johnson Head of Cyber Security clare.johnson@southwales.ac.uk @clareontherun @uswcybers @womencyberwales
  • 13. References Clare Johnson University of South Wales13 Subheading 1. Catalyst, Quick Take: Women in the Workforce—UK (April 24, 2018) 2. Women in Tech: Available at: https://www.womenintech.co.uk (Accessed March 16, 2019) 3. Paine, L. (2017) New Research: In 2017, Women Still Only Make Up 11 Percent of the Cybersecurity Workforce, Veracode, Available at: https://www.veracode.com/blog/new- research-2017-women-still-only-make-11-percent-cybersecurity-workforce (Accessed March 16, 2019) 4. Morgan, S. (2019) Women Represent 20 Percent Of The Global Cybersecurity Workforce In 2019, Cybersecurity Ventures, Available at https://cybersecurityventures.com/women-in- cybersecurity/ (Accessed March 16, 2019) 5. Ismail, N. (2018) Why is it important to build increasingly diverse security teams, Information Age, Available at https://www.information-age.com/diverse-security-teams- 123474574/ (Accessed March 17, 2019)

Editor's Notes

  1. Introduce – start with an anecdote
  2. Many years – new house Not afraid of a bit of DIY, cat flap Mirror – perfect for me Not quite so for husband We lived there for 12 years
  3. Number of women working – provides a useful starting point In cyber – 11-20% but still lags way behind women working My experiences – meeting with IT re firewall Cyber cluster
  4. Number of women working – provides a useful starting point In cyber – 11-20% but still lags way behind women working My experiences – meeting with IT re firewall Cyber cluster
  5. Culture – from early years Women in Cyber Wales Women in Tech International Women in Cyber Day Brownies/ CyberFirst Girls / Wyedean Male support
  6. Not just women Consider other options – not requiring hires Eg existing staff Academics Students
  7. Prep: Governance board, scenario planning, responsibilities – not fully prepared but helpful Attack in Oct 2019, Sat am “IT Desk: security emergency” and voicemails ‘You’ve missed a call’ – format unfamiliar Firewall, password reset, website host notified Emails removed, staff email by lunchtime Report to Anti Phishing Workgroup incident team, Google safe browsing, phishtank, Netcraft and Jisc, later to the ICO Lecturer did further analysis on the site providing useful intelligence Awareness campaign – TV screens, core brief, Christmas message Second incident a month later with PDF attachment – swifter response – useful! Tracer set up
  8. Logged onto staff terminal Response: how to avoid repeat situation – practicalities Notify all staff? Notify affected users