SlideShare a Scribd company logo
Who am I?
• Award-winning entrepreneur, speaker,
consultant & author
• A top 50 influencer in the UK market.
• 19-yrs experience in security, former owner
of Corsaire, a penetration testing company.
• Worked as a senior executive for several
large PLCs, a Board Advisor for a forum with
170 CISOs & have been heavily involved in
industry standards & certifications (OWASP,
CREST & Cyber Essentials).
• SC Awards Judge for Europe & the USA.
• Mum to 3 kids.
WannacryChallenging
landscape
What do our adversaries
look like?
What do cybersecurity
professionals look like?
Exposure & increased risk
“the gap between available qualified
professionals & unfilled positions will
widen to 1.8M by 2022.”
Are women
the answer?
Economics
• McKinsey & Co. reported that full
gender equality would add 26%,
or $28T, to GGDP by 2025.
• Productive, innovative, able to
stay on schedule & within budget,
compared to homogenous teams.
• When women are politically &
economically empowered counties
are more stable.
Performance
• Women think differently to men.
• Any time you have uniformity of
thought, you miss out on the most
creative solutions or tactics that
can help us beat the threat actors.
• http://reports.weforum.org/glob
al-risks-2013/section-seven-
online-only-content/data-
explorer/
Male &
female brains
• Although there are more similarities, there are differences:
• Men’s brains are bigger & heavier relative to their body size
• Men & women have different methods of processing information
• Women have MOST brain cell matter in the frontal cortex (reasoning) &
limbic cortex (emotional)
• Women use both sides of the brain & have 30% more neurons firing
• Strong in empathy, intuition, collaboration, self-control & worry
• Men respond to challenging/ threatening situations with action
• Men & women have different hormones – testosterone, oestrogen,
serotonin
What does this mean?
Men
• Rated their knowledge of IT
controls, awareness &
controls more than women
• Reported less compliance,
more risky behaviours &
more risk amongst male
employees
Women
• Rated their knowledge less
than men
• Reported less risky
behaviours & were more
compliant, embracing
organisational controls and
technology more than men
MORE MEN
More risk + more innovation
MORE WOMEN
Less risk + less innovation
“The gender imbalance in
cybersecurity presents the greatest
threat to our nation’s security”
CORKSCREW
THINKING
WAS COINED BY
WINSTON CHURCHILL
TO DESCRIBE CREATIVE
PROBLEM SOLVERS
Downsides
• Being around people who are different
to us causes discomfort, rougher
interactions, a lack of trust, greater
perceived interpersonal conflict, lower
communication, less cohesion, more
concern about disrespect & lots of
other problems.
Upsides
• More creative, more diligent and
harder-working. Simply interacting
with people who are different forces
us to prepare better, anticipate
alternative viewpoints & expect that
reaching consensus will take effort.
• Encourages us to search for novel
information & perspectives, leading to
better decision making & problem
solving.
What’s happened?
According the
Global Information
Security Workforce
Study women in
security have
dropped from 19%
in 2008 to 11% in
2017.
• The book - In Security:
How a failure to attract &
retain women in
cybersecurity is making
us all less safe
ATTRACT
IDENTIFY
RETAIN
CHALLENGE 1: ATTRACTION
Image & perception
Understand the market
Suppliers
CISO
s
Employees
Role models
CHALLENGE 2: IDENTIFICATION
Women consider organisations that value gender
diversity & develop talent
The recruitment stakeholders:
HR, recruitment consultants & hiring managers
Stereotypes &
unconscious
bias exists
(https://implicit.harvard.edu/implicit/take
atest.html)
Language
WARFARE
CONTEXT
Ambitious
Leading
Decisive
Warrior
Competitive
Support
Interpersonal
Relationships
Complementary
Ninja
Battlefield
Protect individuals
Identity theft
Risk & online safety
Collaboration
PECB, EC Council,
ISACA, GIAC, (ISC)²,
CompTIA,
Offensive Security,
Mile2, EITCI,
eLearnSecurity,
CREST
CHALLENGE 3: RETENTION
LEARN
THE RULES OF THE
GAME & PLAY
BETTER THAN
ANYONE ELSE
Visible work & invisible work
CONFIDENCE
COMPETENCE
Mentors & sponsors matter. Their level
impacts a woman’s career advancement
PECB IT Security Training Courses
 ISO/IEC 27032 Lead Cybersecurity Manager
5 Day Course
 Lead Pen Test Professional
5 Days Course
 ISO/IEC 27034 Application Security
5 Days Course
 ISO/IEC 27035 Information Security Incident Management
5 Days Course
 Computer Forensics Examiner
5 Days Course
Exam and certification fees are included in the training price.
https://www.pecb.com/it-security | www.pecb.com/events
?
hello@jane-frankland.com
http://jane-frankland.com/
The Book: http://jane-frankland.com/events/the-book
http://linkedin.com/in/janefrankland
@JaneFrankland
THANK YOU

More Related Content

What's hot

The Ethics of AI
The Ethics of AIThe Ethics of AI
The Ethics of AI
Mark S. Steed
 
Generative AI and law.pptx
Generative AI and law.pptxGenerative AI and law.pptx
Generative AI and law.pptx
Chris Marsden
 
Industry X.0: Unlocking the Power of Digital in Plant Operations
Industry X.0: Unlocking the Power of Digital in Plant Operations Industry X.0: Unlocking the Power of Digital in Plant Operations
Industry X.0: Unlocking the Power of Digital in Plant Operations
accenture
 
Ethics in the use of Data & AI
Ethics in the use of Data & AI Ethics in the use of Data & AI
Ethics in the use of Data & AI
Kalilur Rahman
 
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
itnewsafrica
 
AI Governance – The Responsible Use of AI
AI Governance – The Responsible Use of AIAI Governance – The Responsible Use of AI
AI Governance – The Responsible Use of AI
NUS-ISS
 
Data Driven Assessment.pdf
Data Driven Assessment.pdfData Driven Assessment.pdf
Data Driven Assessment.pdf
Rawcubes
 
AI and The future of work
AI and The future of work AI and The future of work
AI and The future of work
Subrat Panda, PhD
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
Bernard Marr
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
DevOps.com
 
The Ethics of AI in Education
The Ethics of AI in EducationThe Ethics of AI in Education
The Ethics of AI in Education
Mark S. Steed
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
Daniel Faggella
 
Machine Learning and AI in Risk Management
Machine Learning and AI in Risk ManagementMachine Learning and AI in Risk Management
Machine Learning and AI in Risk Management
QuantUniversity
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
Ansgar Koene
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Big Data
Big DataBig Data
Big Data
Vinayak Kamath
 
Digital Transformation
Digital Transformation Digital Transformation
Digital Transformation
Patrick Van Renterghem
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 
AI in Education must be an opportunity for all
AI in Education must be an opportunity for allAI in Education must be an opportunity for all
AI in Education must be an opportunity for all
Marco Neves
 
Artificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to businessArtificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to business
paul young cpa, cga
 

What's hot (20)

The Ethics of AI
The Ethics of AIThe Ethics of AI
The Ethics of AI
 
Generative AI and law.pptx
Generative AI and law.pptxGenerative AI and law.pptx
Generative AI and law.pptx
 
Industry X.0: Unlocking the Power of Digital in Plant Operations
Industry X.0: Unlocking the Power of Digital in Plant Operations Industry X.0: Unlocking the Power of Digital in Plant Operations
Industry X.0: Unlocking the Power of Digital in Plant Operations
 
Ethics in the use of Data & AI
Ethics in the use of Data & AI Ethics in the use of Data & AI
Ethics in the use of Data & AI
 
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
 
AI Governance – The Responsible Use of AI
AI Governance – The Responsible Use of AIAI Governance – The Responsible Use of AI
AI Governance – The Responsible Use of AI
 
Data Driven Assessment.pdf
Data Driven Assessment.pdfData Driven Assessment.pdf
Data Driven Assessment.pdf
 
AI and The future of work
AI and The future of work AI and The future of work
AI and The future of work
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
The Ethics of AI in Education
The Ethics of AI in EducationThe Ethics of AI in Education
The Ethics of AI in Education
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
 
Machine Learning and AI in Risk Management
Machine Learning and AI in Risk ManagementMachine Learning and AI in Risk Management
Machine Learning and AI in Risk Management
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Big Data
Big DataBig Data
Big Data
 
Digital Transformation
Digital Transformation Digital Transformation
Digital Transformation
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
AI in Education must be an opportunity for all
AI in Education must be an opportunity for allAI in Education must be an opportunity for all
AI in Education must be an opportunity for all
 
Artificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to businessArtificial intelligence (ai) and its impact to business
Artificial intelligence (ai) and its impact to business
 

Similar to How Are Women Making a Difference in Cyber-security?

Why diversity matters
Why diversity mattersWhy diversity matters
Why diversity matters
Shiftbalance
 
Beyond Diversity to Inclusion Through Innovation - AWS Summit Sydney
Beyond Diversity to Inclusion Through Innovation - AWS Summit SydneyBeyond Diversity to Inclusion Through Innovation - AWS Summit Sydney
Beyond Diversity to Inclusion Through Innovation - AWS Summit Sydney
Amazon Web Services
 
The Relational Chain Pp February24,2009
The Relational Chain Pp February24,2009The Relational Chain Pp February24,2009
The Relational Chain Pp February24,2009jeanlafrance
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Case IQ
 
Diversity_Inclusion_TheChazinGroupLLC
Diversity_Inclusion_TheChazinGroupLLCDiversity_Inclusion_TheChazinGroupLLC
Diversity_Inclusion_TheChazinGroupLLCEthan Chazin MBA
 
BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
Jane Frankland
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
Kanbna India 2022 | Rucha Kapare | Allyship in Agile
Kanbna India 2022 | Rucha Kapare | Allyship in AgileKanbna India 2022 | Rucha Kapare | Allyship in Agile
Kanbna India 2022 | Rucha Kapare | Allyship in Agile
LeanKanbanIndia
 
Tech Startups Diversity and Inclusion
Tech Startups Diversity and InclusionTech Startups Diversity and Inclusion
Tech Startups Diversity and InclusionPeggy Lawless
 
WMPRSA Ethics Presentation by Karen Swim
WMPRSA Ethics Presentation by Karen SwimWMPRSA Ethics Presentation by Karen Swim
WMPRSA Ethics Presentation by Karen Swim
StephanieBradley33
 
Can Agility Change the World?
Can Agility Change the World?Can Agility Change the World?
Can Agility Change the World?
Cara Turner
 
Risk Culture Building: a Strategic Approach to Risk Management
Risk Culture Building: a Strategic Approach to Risk ManagementRisk Culture Building: a Strategic Approach to Risk Management
Risk Culture Building: a Strategic Approach to Risk Management
chungarisk
 
Diversity inclusion part1
Diversity inclusion part1Diversity inclusion part1
Diversity inclusion part1
Ethan Chazin MBA
 
2015 think ida expo
2015 think ida expo2015 think ida expo
2015 think ida expo
Tim Richardson
 
EXIM SUMMIT 2015 in Dublin Ireland. ''What is Culture''
EXIM SUMMIT 2015 in Dublin Ireland.  ''What is Culture''EXIM SUMMIT 2015 in Dublin Ireland.  ''What is Culture''
EXIM SUMMIT 2015 in Dublin Ireland. ''What is Culture''
davidpohaughnessy
 
Navigating Disruption with Gender Diversity
Navigating Disruption with Gender DiversityNavigating Disruption with Gender Diversity
Navigating Disruption with Gender Diversity
Monica Maria Sanchez
 
Chicago Camps- Designing for Diversity in Org Design
Chicago Camps- Designing for Diversity in Org DesignChicago Camps- Designing for Diversity in Org Design
Chicago Camps- Designing for Diversity in Org Design
Eli Silva
 
Leveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR FunctionLeveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR Function
Human Capital Media
 
Leveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR FunctionLeveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR Function
Human Capital Media
 

Similar to How Are Women Making a Difference in Cyber-security? (20)

Why diversity matters
Why diversity mattersWhy diversity matters
Why diversity matters
 
Beyond Diversity to Inclusion Through Innovation - AWS Summit Sydney
Beyond Diversity to Inclusion Through Innovation - AWS Summit SydneyBeyond Diversity to Inclusion Through Innovation - AWS Summit Sydney
Beyond Diversity to Inclusion Through Innovation - AWS Summit Sydney
 
The Relational Chain Pp February24,2009
The Relational Chain Pp February24,2009The Relational Chain Pp February24,2009
The Relational Chain Pp February24,2009
 
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
Preventing Bullying and Harassment Through Diversity and Inclusion in the Wor...
 
Diversity_Inclusion_TheChazinGroupLLC
Diversity_Inclusion_TheChazinGroupLLCDiversity_Inclusion_TheChazinGroupLLC
Diversity_Inclusion_TheChazinGroupLLC
 
BSides Manchester
BSides ManchesterBSides Manchester
BSides Manchester
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Kanbna India 2022 | Rucha Kapare | Allyship in Agile
Kanbna India 2022 | Rucha Kapare | Allyship in AgileKanbna India 2022 | Rucha Kapare | Allyship in Agile
Kanbna India 2022 | Rucha Kapare | Allyship in Agile
 
presentation127
presentation127presentation127
presentation127
 
Tech Startups Diversity and Inclusion
Tech Startups Diversity and InclusionTech Startups Diversity and Inclusion
Tech Startups Diversity and Inclusion
 
WMPRSA Ethics Presentation by Karen Swim
WMPRSA Ethics Presentation by Karen SwimWMPRSA Ethics Presentation by Karen Swim
WMPRSA Ethics Presentation by Karen Swim
 
Can Agility Change the World?
Can Agility Change the World?Can Agility Change the World?
Can Agility Change the World?
 
Risk Culture Building: a Strategic Approach to Risk Management
Risk Culture Building: a Strategic Approach to Risk ManagementRisk Culture Building: a Strategic Approach to Risk Management
Risk Culture Building: a Strategic Approach to Risk Management
 
Diversity inclusion part1
Diversity inclusion part1Diversity inclusion part1
Diversity inclusion part1
 
2015 think ida expo
2015 think ida expo2015 think ida expo
2015 think ida expo
 
EXIM SUMMIT 2015 in Dublin Ireland. ''What is Culture''
EXIM SUMMIT 2015 in Dublin Ireland.  ''What is Culture''EXIM SUMMIT 2015 in Dublin Ireland.  ''What is Culture''
EXIM SUMMIT 2015 in Dublin Ireland. ''What is Culture''
 
Navigating Disruption with Gender Diversity
Navigating Disruption with Gender DiversityNavigating Disruption with Gender Diversity
Navigating Disruption with Gender Diversity
 
Chicago Camps- Designing for Diversity in Org Design
Chicago Camps- Designing for Diversity in Org DesignChicago Camps- Designing for Diversity in Org Design
Chicago Camps- Designing for Diversity in Org Design
 
Leveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR FunctionLeveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR Function
 
Leveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR FunctionLeveraging Behavioral Nudges in Your HR Function
Leveraging Behavioral Nudges in Your HR Function
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

How Are Women Making a Difference in Cyber-security?

Editor's Notes

  1. Cyberattacks are increasing & becoming more sophisticated Cybercriminals follow the money trail They only need to find ONE way New technologies, legacy systems plus non electronic systems (cold data storage) New legislation, like the GDPR & high fines
  2. Why does this matter? According to Frost & Sullivan:
  3. I believe so….
  4. There are more similarities than we think
  5. There are more similarities than we think
  6. What this means – less innovation
  7. Are we at war? Some believe so….
  8. Women came as school leavers & from unis. They were linguists, translators, chess champions, mathematicians. You had women like Mavis Batey, Margaret Rock & Joan Clarke. You had men like Ian Flemming, the writer of James Bond; and Alan Turing, who was gay & most probably autistic. Y service who interrupted codes, to code breakers, to bombe & colossus operators, admins, cooks, cleaners, transportation officers etc.
  9. My daughter – Anja – choosing her GCSE options Technology is the future. Technology is the now.
  10. It all started with a report I happened to pick up & read.
  11. Raytheon and the National Cybersecurity Alliance surveyed the career interests and educational preparedness Gen Ys in 12 countries, 62% of men and 75% of women said no secondary or high school computer classes offered the skills to help them pursue a career in cyber security.
  12. To attract women you must know they consider the company
  13. Stereotypes & unconscious bias
  14. Job specs Gender neutral language – tools e.g.Textio
  15. Global spending is set to rise to $1Tn in from 2017 to 2021 and the cost of cybercrime to global businesses, annually, is between $2-$3Tn. Cyber security job postings are growing 3.5 times faster than IT jobs; there are 1m vacant cyber security jobs globally and this is set to rise to 6M by 2020. The shortages are: security analyst, security auditor, security architect, forensic analyst and incident handler.
  16. You have to learn the rules of the game & then play better than anyone else
  17. Working on the right projects matters for advancement. Men reported working on larger and more visible projects that they perceived to carry more risk to their companies. Men also had greater access to roles that are more likely to be mission-critical over the course of their careers than women did, including those with profit and loss responsibility, budget responsibility, and management of direct reports. Women got fewer international experiences, but were no more likely than men to turn down an opportunity for an international assignment when offered.
  18. Equity
  19. Mentor’s level, not gender, impacted career advancement. Attract a mentor who’s highly placed in an organization & in a better position to provide sponsorship. High potentials who were developing a protégé received $25K greater compensation growth in 2-years Being developed matters:A higher percentage of high potentials who had received developmental support in the past two years were more likely to be offering similar support to a protégé. Numbers matter: The more people high potentials received developmental advice from, the more likely they were to pay it forward to others.